Sciweavers

264 search results - page 32 / 53
» Source-Based Trace Exploration
Sort
View
SMI
2005
IEEE
14 years 3 months ago
Curvature Maps for Local Shape Comparison
— The ability to identify similarities between shapes is important for applications such as medical diagnosis, object registration and alignment, and shape retrieval. In this pap...
Timothy Gatzke, Cindy Grimm, Michael Garland, Stev...
CCS
2004
ACM
14 years 3 months ago
Operational experiences with high-volume network intrusion detection
In large-scale environments, network intrusion detection systems (NIDSs) face extreme challenges with respect to traffic volume, traffic diversity, and resource management. Whil...
Holger Dreger, Anja Feldmann, Vern Paxson, Robin S...
ISCA
2002
IEEE
127views Hardware» more  ISCA 2002»
14 years 2 months ago
The Optimum Pipeline Depth for a Microprocessor
The impact of pipeline length on the performance of a microprocessor is explored both theoretically and by simulation. An analytical theory is presented that shows two opposing ar...
Allan Hartstein, Thomas R. Puzak
CODES
1999
IEEE
14 years 2 months ago
An MPEG-2 decoder case study as a driver for a system level design methodology
We present a case study on the design of a heterogeneous architecture for MPEG-2 video decoding. The primary objective of the case study is the validation of the SPADE methodology...
Pieter van der Wolf, Paul Lieverse, Mudit Goel, Da...
ENTCS
2007
115views more  ENTCS 2007»
13 years 9 months ago
A Global Algorithm for Model-Based Test Suite Generation
Abstract. Model-based testing has been proposed as a technique to automatically verify that a system conforms to its specification. A popular approach is to use a model-checker to...
Anders Hessel, Paul Pettersson