Sciweavers

326 search results - page 42 / 66
» Automatic binary deobfuscation
Sort
View
RSP
2008
IEEE
182views Control Systems» more  RSP 2008»
14 years 2 months ago
From Application to ASIP-based FPGA Prototype: a Case Study on Turbo Decoding
ASIP-based implementations constitute a key trend in SoC design enabling optimal tradeoffs between performance and flexibility. This paper details a case study of an ASIP-based im...
Olivier Muller, Amer Baghdadi, Michel Jéz&e...
DAC
2010
ACM
13 years 11 months ago
Towards scalable system-level reliability analysis
State-of-the-art automatic reliability analyses as used in system-level design approaches mainly rely on Binary Decision Diagrams (BDDs) and, thus, face two serious problems: (1) ...
Michael Glaß, Martin Lukasiewycz, Christian ...
EXPCS
2007
13 years 11 months ago
Analysis of input-dependent program behavior using active profiling
Utility programs, which perform similar and largely independent operations on a sequence of inputs, include such common applications as compilers, interpreters, and document parse...
Xipeng Shen, Michael L. Scott, Chengliang Zhang, S...
DGO
2007
152views Education» more  DGO 2007»
13 years 9 months ago
Identifying and classifying subjective claims
To understand the subjective documents, for example, public comments on the government’s proposed regulation, opinion identification and classification is required. Rather than ...
Namhee Kwon, Liang Zhou, Eduard H. Hovy, Stuart W....
HIS
2004
13 years 9 months ago
Reinforcement Learning Hierarchical Neuro-Fuzzy Politree Model for Control of Autonomous Agents
: This work presents a new hybrid neuro-fuzzy model for automatic learning of actions taken by agents. The main objective of this new model is to provide an agent with intelligence...
Karla Figueiredo, Marley B. R. Vellasco, Marco Aur...