Sciweavers

205 search results - page 17 / 41
» A research demonstration of code bubbles
Sort
View
CGO
2005
IEEE
14 years 2 months ago
Model-Based Framework: An Approach for Profit-Driven Optimization
Although optimizations have been applied for a number of years to improve the performance of software, problems that have been long-standing remain, which include knowing what opt...
Min Zhao, Bruce R. Childers, Mary Lou Soffa
DSN
2005
IEEE
14 years 2 months ago
Modeling and Automated Containment of Worms
Self-propagating codes, called worms, such as Code Red, Nimda, and Slammer, have drawn significant attention due to their enormous adverse impact on the Internet. There is a grea...
Sarah H. Sellke, Ness B. Shroff, Saurabh Bagchi
ACMMSP
2005
ACM
99views Hardware» more  ACMMSP 2005»
14 years 2 months ago
Gated memory control for memory monitoring, leak detection and garbage collection
ct In the past, program monitoring often operates at the code level, performing checks at function and loop boundaries. Recent research shows that profiling analysis can identify ...
Chen Ding, Chengliang Zhang, Xipeng Shen, Mitsunor...
CTRSA
2005
Springer
79views Cryptology» more  CTRSA 2005»
14 years 2 months ago
Malicious Cryptography: Kleptographic Aspects
Abstract. In the last few years we have concentrated our research efforts on new threats to the computing infrastructure that are the result of combining malicious software (malwar...
Adam Young, Moti Yung
WCRE
2003
IEEE
14 years 2 months ago
RegReg: a Lightweight Generator of Robust Parsers for Irregular Languages
In reverse engineering, parsing may be partially done to extract lightweight source models. Parsing code containing preprocessing directives, syntactical errors and embedded langu...
Mario Latendresse