Sciweavers

3431 search results - page 117 / 687
» A new instructional operating system
Sort
View
PEPM
2010
ACM
14 years 6 months ago
Context-sensitive analysis of obfuscated x86 executables
A method for context-sensitive analysis of binaries that may have obfuscated procedure call and return operations is presented. Such binaries may use operators to directly manipul...
Arun Lakhotia, Davidson R. Boccardo, Anshuman Sing...
SOSP
1997
ACM
13 years 10 months ago
Automated Hoarding for Mobile Computers
A common problem facing mobile computing is disconnected operation, or computing in the absence of a network. Hoarding eases disconnected operation by selecting a subset of the us...
Geoffrey H. Kuenning, Gerald J. Popek
DATE
2006
IEEE
123views Hardware» more  DATE 2006»
14 years 3 months ago
Constructing portable compiled instruction-set simulators: an ADL-driven approach
Instruction set simulators are common tools used for the development of new architectures and embedded software among countless other functions. This paper presents a framework th...
Joseph D'Errico, Wei Qin
ICMI
2004
Springer
183views Biometrics» more  ICMI 2004»
14 years 2 months ago
Agent and library augmented shared knowledge areas (ALASKA)
This paper reports on an NSF-funded effort now underway to integrate three learning technologies that have emerged and matured over the past decade; each has presented compelling ...
Eric R. Hamilton
MICRO
1997
IEEE
127views Hardware» more  MICRO 1997»
14 years 1 months ago
Exploiting Dead Value Information
We describe Dead Value Information (DVI) and introduce three new optimizations which exploit it. DVI provides assertions that certain register values are dead, meaning they will n...
Milo M. K. Martin, Amir Roth, Charles N. Fischer