Sciweavers

3667 search results - page 715 / 734
» Software Rejuvenation - Modeling and Analysis
Sort
View
DAC
1997
ACM
14 years 24 days ago
Electronic Component Information Exchange (ECIX)
A number of industry trends are shaping the requirements for IC and electronic equipment design. The density and complexity of circuit technologies have increased to a point where...
Donald R. Cottrell
SIGMETRICS
1996
ACM
122views Hardware» more  SIGMETRICS 1996»
14 years 22 days ago
Experiments with Digital Video Playback
In this paper we describe our experiments on digital video applications, concentrating on the static and dynamic tradeo s involved in video playback. Our results were extracted fr...
Richard Gerber, Ladan Gharai
CCS
2007
ACM
14 years 18 days ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
DIALM
2007
ACM
131views Algorithms» more  DIALM 2007»
14 years 16 days ago
Dessy: Towards Flexible Mobile Desktop Search
In the near future, mobile devices are expected to have a storage capacity comparable to today's desktop machines. As the amount of infomation grows, conventional search tool...
Eemil Lagerspetz, Tancred Lindholm, Sasu Tarkoma
EATIS
2007
ACM
14 years 16 days ago
Exhaustif: a fault injection tool for distributed heterogeneous embedded systems
This paper presents a new fault injection tool called Exhaustif (Exhaustive Workbench for Systems Reliability). Exhaustif is a SWIFI fault injection tool for fault tolerance verif...
Antonio Dasilva, José-Fernán Mart&ia...