Sciweavers

2018 search results - page 60 / 404
» Code Normal Forms
Sort
View
ISSA
2008
13 years 11 months ago
A Collaborative Distributed Virtual Platform for Forensic Analysis of Malicious Code
Malicious software is prevalent in many forms with the potential for many types of malware to be downloaded while browsing the Internet using an unprotected system. The potential ...
Leonard Shand, Theodore Tryfonas
MICRO
2002
IEEE
113views Hardware» more  MICRO 2002»
14 years 2 months ago
Vacuum packing: extracting hardware-detected program phases for post-link optimization
This paper presents Vacuum Packing, a new approach to profile-based program optimization. Instead of using traditional aggregate or summarized execution profile weights, this ap...
Ronald D. Barnes, Erik M. Nystrom, Matthew C. Mert...
LFCS
2009
Springer
14 years 4 months ago
The Logic of Proofs as a Foundation for Certifying Mobile Computation
We explore an intuitionistic fragment of Art¨emov’s Logic of Proofs as a type system for a programming language for mobile units. Such units consist of both a code and certific...
Eduardo Bonelli, Federico Feller
TIT
1998
123views more  TIT 1998»
13 years 9 months ago
The Minimum Description Length Principle in Coding and Modeling
—We review the principles of Minimum Description Length and Stochastic Complexity as used in data compression and statistical modeling. Stochastic complexity is formulated as the...
Andrew R. Barron, Jorma Rissanen, Bin Yu
DCC
1995
IEEE
14 years 1 months ago
An Automatic System for Model-Based Coding of Faces
We present a fully automatic system for 2D model-based image coding of human faces for potential applications such as video telephony, database image compression, and face recogni...
Baback Moghaddam, Alex Pentland