Sciweavers

164 search results - page 14 / 33
» Application Intrusion Detection using Language Library Calls
Sort
View
DATE
2008
IEEE
182views Hardware» more  DATE 2008»
14 years 1 months ago
An adaptable FPGA-based System for Regular Expression Matching
In many applications string pattern matching is one of the most intensive tasks in terms of computation time and memory accesses. Network Intrusion Detection Systems and DNA Seque...
Ivano Bonesana, Marco Paolieri, Marco D. Santambro...
KBSE
2009
IEEE
14 years 2 months ago
Improving API Usage through Automatic Detection of Redundant Code
—Software projects often rely on third-party libraries made accessible through Application Programming Interfaces (APIs). We have observed many cases where APIs are used in ways ...
David Kawrykow, Martin P. Robillard
HASKELL
2009
ACM
14 years 2 months ago
Finding the needle: stack traces for GHC
Even Haskell programs can occasionally go wrong. Programs calling head on an empty list, and incomplete patterns in function definitions can cause program crashes, reporting littl...
Tristan O. R. Allwood, Simon Peyton Jones, Susan E...
DATE
2008
IEEE
153views Hardware» more  DATE 2008»
14 years 1 months ago
An Optimized Message Passing Framework for Parallel Implementation of Signal Processing Applications
Novel reconfigurable computing platforms enable efficient realizations of complex signal processing applications by allowing exploitation of parallelization resulting in high thro...
Sankalita Saha, Jason Schlessman, Sebastian Puthen...
ICFP
2001
ACM
14 years 7 months ago
A New Notation for Arrows
The categorical notion of monad, used by Moggi to structure denotational descriptions, has proved to be a powerful tool for structuring combinator libraries. Moreover, the monadic...
Ross Paterson