Sciweavers

1781 search results - page 305 / 357
» Visualizing program execution using user abstractions
Sort
View
ACSAC
2006
IEEE
14 years 2 months ago
Foreign Code Detection on the Windows/X86 Platform
As new attacks against Windows-based machines emerge almost on a daily basis, there is an increasing need to “lock down” individual users’ desktop machines in corporate comp...
Susanta Nanda, Wei Li, Lap-Chung Lam, Tzi-cker Chi...
BMCBI
2008
141views more  BMCBI 2008»
13 years 9 months ago
EzArray: A web-based highly automated Affymetrix expression array data management and analysis system
Background: Though microarray experiments are very popular in life science research, managing and analyzing microarray data are still challenging tasks for many biologists. Most m...
Yuerong Zhu, Yuelin Zhu, Wei Xu
VALUETOOLS
2006
ACM
167views Hardware» more  VALUETOOLS 2006»
14 years 2 months ago
Detailed cache simulation for detecting bottleneck, miss reason and optimization potentialities
Cache locality optimization is an efficient way for reducing the idle time of modern processors in waiting for needed data. This kind of optimization can be achieved either on the...
Jie Tao, Wolfgang Karl
IPPS
2008
IEEE
14 years 3 months ago
Balancing HPC applications through smart allocation of resources in MT processors
Abstract—Many studies have shown that load imbalancing causes significant performance degradation in High Performance Computing (HPC) applications. Nowadays, Multi-Threaded (MT1...
Carlos Boneti, Roberto Gioiosa, Francisco J. Cazor...
ICSE
1999
IEEE-ACM
14 years 1 months ago
A Practical Method for Verifying Event-Driven Software
Formal verification methods are used only sparingly in software development. The most successful methods to date are based on the use of model checking tools. To use such he user ...
Gerard J. Holzmann, Margaret H. Smith