Sciweavers

3458 search results - page 609 / 692
» Abstracting Control
Sort
View
PEPM
2010
ACM
14 years 4 months ago
Context-sensitive analysis of obfuscated x86 executables
A method for context-sensitive analysis of binaries that may have obfuscated procedure call and return operations is presented. Such binaries may use operators to directly manipul...
Arun Lakhotia, Davidson R. Boccardo, Anshuman Sing...
SAB
2010
Springer
212views Optimization» more  SAB 2010»
13 years 5 months ago
A Study of Adaptive Locomotive Behaviors of a Biped Robot: Patterns Generation and Classification
Abstract. Neurobiological studies showed the important role of Centeral Pattern Generators for spinal cord in the control and sensory feedback of animals' locomotion. In this ...
John Nassour, Patrick Henaff, Fathi Ben Ouezdou, G...
APPROX
2010
Springer
168views Algorithms» more  APPROX 2010»
13 years 9 months ago
Lower Bounds for Local Monotonicity Reconstruction from Transitive-Closure Spanners
Abstract. Given a directed graph G = (V, E) and an integer k 1, a ktransitive-closure-spanner (k-TC-spanner) of G is a directed graph H = (V, EH ) that has (1) the same transitive...
Arnab Bhattacharyya, Elena Grigorescu, Madhav Jha,...
CAV
2005
Springer
150views Hardware» more  CAV 2005»
14 years 1 months ago
Reasoning About Threads Communicating via Locks
Abstract. We propose a new technique for the static analysis of concurrent programs comprised of multiple threads. In general, the problem is known to be undecidable even for progr...
Vineet Kahlon, Franjo Ivancic, Aarti Gupta
CLOUD
2010
ACM
14 years 24 days ago
G-Store: a scalable data store for transactional multi key access in the cloud
Cloud computing has emerged as a preferred platform for deploying scalable web-applications. With the growing scale of these applications and the data associated with them, scalab...
Sudipto Das, Divyakant Agrawal, Amr El Abbadi