Sciweavers

164 search results - page 17 / 33
» Application Intrusion Detection using Language Library Calls
Sort
View
PLDI
2000
ACM
13 years 12 months ago
Exploiting superword level parallelism with multimedia instruction sets
Increasing focus on multimedia applications has prompted the addition of multimedia extensions to most existing general purpose microprocessors. This added functionality comes pri...
Samuel Larsen, Saman P. Amarasinghe
SAC
2006
ACM
14 years 1 months ago
Evaluation of rule-based modularization in model transformation languages illustrated with ATL
This paper studies ways for modularizing transformation definitions in current rule-based model transformation languages. Two scenarios are shown in which the modular units are id...
Ivan Kurtev, Klaas van den Berg, Fréd&eacut...
SAFECOMP
2005
Springer
14 years 29 days ago
Are High-Level Languages Suitable for Robust Telecoms Software?
In the telecommunications sector product development must minimise time to market while delivering high levels of dependability, availability, maintainability and scalability. High...
Jan Henry Nyström, Philip W. Trinder, David J...
ICSE
2008
IEEE-ACM
14 years 8 months ago
Clone detection in automotive model-based development
Model-based development is becoming an increasingly common development methodology. In important domains like embedded systems already major parts of the code are generated from m...
Benjamin Hummel, Bernhard Schätz, Elmar J&uum...
IEEEARES
2009
IEEE
14 years 2 months ago
Investigating the Implications of Virtual Machine Introspection for Digital Forensics
— Researchers and practitioners in computer forensics currently must base their analysis on information that is either incomplete or produced by tools that may themselves be comp...
Kara L. Nance, Brian Hay, Matt Bishop