Sciweavers

2018 search results - page 340 / 404
» Code Normal Forms
Sort
View
ICSM
2009
IEEE
14 years 3 months ago
Detecting virus mutations via dynamic matching
To defeat current commercial antivirus software, the virus developers are employing obfuscation techniques to create mutating viruses. The current antivirus software cannot handle...
Min Feng, Rajiv Gupta
IWOMP
2009
Springer
14 years 3 months ago
Scalability Evaluation of Barrier Algorithms for OpenMP
OpenMP relies heavily on barrier synchronization to coordinate the work of threads that are performing the computations in a parallel region. A good implementation of barriers is ...
Ramachandra C. Nanjegowda, Oscar Hernandez, Barbar...
CANDC
2009
ACM
14 years 3 months ago
BodyDaemon
This paper introduces the idea of actualizing theory in the context of artistic practice. We describe the project BodyDaemon and its function as a technology-based artwork that is...
Carlos Castellanos, Thecla Schiphorst
SMA
2009
ACM
134views Solid Modeling» more  SMA 2009»
14 years 3 months ago
Exact Delaunay graph of smooth convex pseudo-circles: general predicates, and implementation for ellipses
We examine the problem of computing exactly the Delaunay graph (and the dual Voronoi diagram) of a set of, possibly intersecting, smooth convex pseudo-circles in the Euclidean pla...
Ioannis Z. Emiris, Elias P. Tsigaridas, George M. ...
APSEC
2008
IEEE
14 years 3 months ago
A Heap Model for Java Bytecode to Support Separation Logic
Memory usage analysis is an important problem for resource-constrained mobile devices, especially under mission- or safety-critical circumstances. Program codes running on or bein...
Chenguang Luo, Guanhua He, Shengchao Qin