Sciweavers

6884 search results - page 1350 / 1377
» The macro-structure of use of help
Sort
View
ISCC
2007
IEEE
136views Communications» more  ISCC 2007»
14 years 2 months ago
Analysis of the IPv4 Address Space Delegation Structure
The Internet has grown tremendously in terms of the number of users who rely on it and the number of organizations that are connected to it. Characterizing how this growth affects...
Anusha Sriraman, Kevin R. B. Butler, Patrick Drew ...
MICRO
2007
IEEE
150views Hardware» more  MICRO 2007»
14 years 2 months ago
Leveraging 3D Technology for Improved Reliability
Aggressive technology scaling over the years has helped improve processor performance but has caused a reduction in processor reliability. Shrinking transistor sizes and lower sup...
Niti Madan, Rajeev Balasubramonian
ROMAN
2007
IEEE
175views Robotics» more  ROMAN 2007»
14 years 2 months ago
BuildBot: Robotic Monitoring of Agile Software Development Teams
Abstract - In this paper, we describe BuildBot, a robotic interface developed to assist with the continuous integration process utilized by agile software development teams. BuildB...
Ruth Ablett, Ehud Sharlin, Frank Maurer, Jörg...
CAV
2007
Springer
166views Hardware» more  CAV 2007»
14 years 1 months ago
Fast and Accurate Static Data-Race Detection for Concurrent Programs
We present new techniques for fast, accurate and scalable static data race detection in concurrent programs. Focusing our analysis on Linux device drivers allowed us to identify th...
Vineet Kahlon, Yu Yang, Sriram Sankaranarayanan, A...
CCS
2007
ACM
14 years 1 months ago
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities
Software vulnerabilities have been the main contributing factor to the Internet security problems such as fast spreading worms. Among these software vulnerabilities, memory corrup...
Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu
« Prev « First page 1350 / 1377 Last » Next »