Sciweavers

284 search results - page 47 / 57
» A Semantic Analysis of C Templates
Sort
View
CSMR
2008
IEEE
14 years 2 months ago
Package Reference Fingerprint: a Rich and Compact Visualization to Understand Package Relationships
Object-oriented languages such as Java, Smalltalk, and C++ structure their programs using packages, allowing classes to be organized into named abstractions. Maintainers of large ...
Hani Abdeen, Ilham Alloui, Stéphane Ducasse...
ACSAC
2007
IEEE
14 years 1 months ago
MetaAware: Identifying Metamorphic Malware
Detection of malicious software (malware) by the use of static signatures is often criticized for being overly simplistic. Available methods of obfuscating code (so-called metamor...
Qinghua Zhang, Douglas S. Reeves
EMSOFT
2007
Springer
14 years 1 months ago
Scheduling multiple independent hard-real-time jobs on a heterogeneous multiprocessor
This paper proposes a scheduling strategy and an automatic scheduling flow that enable the simultaneous execution of multiple hard-real-time dataflow jobs. Each job has its own ...
Orlando Moreira, Frederico Valente, Marco Bekooij
ISCA
2005
IEEE
135views Hardware» more  ISCA 2005»
14 years 1 months ago
Deconstructing Commodity Storage Clusters
The traditional approach for characterizing complex systems is to run standard workloads and measure the resulting performance as seen by the end user. However, unique opportuniti...
Haryadi S. Gunawi, Nitin Agrawal, Andrea C. Arpaci...
LICS
1999
IEEE
13 years 11 months ago
Proving Security Protocols Correct
Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified ...
Lawrence C. Paulson