Sciweavers

2342 search results - page 396 / 469
» A Methodology for Evaluating Software Engineering Methods an...
Sort
View
KDD
2004
ACM
330views Data Mining» more  KDD 2004»
14 years 9 months ago
Learning to detect malicious executables in the wild
In this paper, we describe the development of a fielded application for detecting malicious executables in the wild. We gathered 1971 benign and 1651 malicious executables and enc...
Jeremy Z. Kolter, Marcus A. Maloof
ISBRA
2007
Springer
14 years 3 months ago
Wavelet Image Interpolation (WII): A Wavelet-Based Approach to Enhancement of Digital Mammography Images
Abstract. Cancer detection using mammography focuses on characteristics of tiny microcalcifications, including the number, size, and spatial arrangement of microcalcification clu...
Gordana Derado, F. DuBois Bowman, Rajan Patel, Mar...
CGO
2010
IEEE
14 years 4 months ago
Integrated instruction selection and register allocation for compact code generation exploiting freeform mixing of 16- and 32-bi
For memory constrained embedded systems code size is at least as important as performance. One way of increasing code density is to exploit compact instruction formats, e.g. ARM T...
Tobias J. K. Edler von Koch, Igor Böhm, Bj&ou...
EMSOFT
2008
Springer
13 years 11 months ago
Tax-and-spend: democratic scheduling for real-time garbage collection
Real-time Garbage Collection (RTGC) has recently advanced to the point where it is being used in production for financial trading, military command-and-control, and telecommunicat...
Joshua S. Auerbach, David F. Bacon, Perry Cheng, D...
FASE
2007
Springer
14 years 3 months ago
Declared Type Generalization Checker: An Eclipse Plug-In for Systematic Programming with More General Types
The Declared Type Generalization Checker is a plug-in for Eclipse’s Java Development Tools (JDT) that supports developers in systematically finding and using better fitting types...
Markus Bach, Florian Forster, Friedrich Steimann