Sciweavers

1359 search results - page 150 / 272
» Black-Box Program Specialization
Sort
View
SP
2006
IEEE
127views Security Privacy» more  SP 2006»
14 years 3 months ago
Siren: Catching Evasive Malware (Short Paper)
With the growing popularity of anomaly detection systems, which is due partly to the rise in zero-day attacks, a new class of threats have evolved where the attacker mimics legiti...
Kevin Borders, Xin Zhao, Atul Prakash
FOCS
2005
IEEE
14 years 2 months ago
Approximation Algorithms for Unique Games
We present a polynomial time algorithm based on semidefinite programming that, given a unique game of value 1 − O(1/ log n), satisfies a constant fraction of constraints, wher...
Luca Trevisan
IPPS
2005
IEEE
14 years 2 months ago
Code-Size Minimization in Multiprocessor Real-Time Systems
— Program code size is a critical factor in determining the manufacturing cost of many embedded systems, particularly those aimed at the extremely costconscious consumer market. ...
Sanjoy K. Baruah, Nathan Fisher
CPAIOR
2005
Springer
14 years 2 months ago
A Search-Infer-and-Relax Framework for Integrating Solution Methods
Abstract. We present an algorithmic framework for integrating solution methods that is based on search, inference, and relaxation and their interactions. We show that the following...
John N. Hooker
ISMIR
2005
Springer
171views Music» more  ISMIR 2005»
14 years 2 months ago
A Histogram Algorithm for Fast Audio Retrieval
This paper describes a fast audio detection method for specific audio retrieval in the AV stream. The method is a histogram matching algorithm based on structural and perceptual f...
Wei Liang, Shuwu Zhang, Bo Xu