Sciweavers

2957 search results - page 539 / 592
» Code analysis and CS-XML
Sort
View
JOT
2010
144views more  JOT 2010»
13 years 7 months ago
REquirements, Aspects and Software Quality: the REASQ model
Object-oriented analysis and design have been more concerned with system functionality, neglecting non-functional aspects; the result is code which is tangled and difficult to main...
Isi Castillo, Francisca Losavio, Alfredo Matteo, J...
VLSISP
2008
147views more  VLSISP 2008»
13 years 7 months ago
Data Reuse Exploration for Low Power Motion Estimation Architecture Design in H.264 Encoder
Data access usually leads to more than 50% of the power cost in a modern signal processing system. To realize a low-power design, how to reduce the memory access power is a critica...
Yu-Han Chen, Tung-Chien Chen, Chuan-Yung Tsai, Sun...
JVCIR
2010
177views more  JVCIR 2010»
13 years 7 months ago
Ripplet: A new transform for image processing
Efficient representation of images usually leads to improvements in storage efficiency, computational complexity and performance of image processing algorithms. Efficient represe...
Jun Xu, Lei Yang, Dapeng Wu
ML
2010
ACM
155views Machine Learning» more  ML 2010»
13 years 7 months ago
On the infeasibility of modeling polymorphic shellcode - Re-thinking the role of learning in intrusion detection systems
Current trends demonstrate an increasing use of polymorphism by attackers to disguise their exploits. The ability for malicious code to be easily, and automatically, transformed in...
Yingbo Song, Michael E. Locasto, Angelos Stavrou, ...
RAID
2010
Springer
13 years 6 months ago
Automatic Discovery of Parasitic Malware
Malicious software includes functionality designed to block discovery or analysis by defensive utilities. To prevent correct attribution of undesirable behaviors to the malware, it...
Abhinav Srivastava, Jonathon T. Giffin