Sciweavers

4469 search results - page 41 / 894
» Dynamic Program Slicing
Sort
View
NDSS
2009
IEEE
14 years 2 months ago
K-Tracer: A System for Extracting Kernel Malware Behavior
Kernel rootkits can provide user level-malware programs with the additional capabilities of hiding their malicious activities by altering the legitimate kernel behavior of an oper...
Andrea Lanzi, Monirul I. Sharif, Wenke Lee
EDO
2000
Springer
13 years 11 months ago
Component Metadata for Software Engineering Tasks
Abstract. This paper presents a framework that lets a component developer provide a component user with different kinds of information, depending on the specific context and needs....
Alessandro Orso, Mary Jean Harrold, David S. Rosen...
SIGGRAPH
1995
ACM
13 years 11 months ago
Time-dependent three-dimensional intravascular ultrasound
Intravascular ultrasonography and x-ray angiography provide two complimentary techniques for imaging the moving coronary arteries. We present a technique that combines the strengt...
Jed Lengyel, Donald P. Greenberg, Richard Popp
FPGA
2010
ACM
276views FPGA» more  FPGA 2010»
14 years 4 months ago
Accelerating Monte Carlo based SSTA using FPGA
Monte Carlo based SSTA serves as the golden standard against alternative SSTA algorithms, but it is seldom used in practice due to its high computation time. In this paper, we acc...
Jason Cong, Karthik Gururaj, Wei Jiang, Bin Liu, K...
CMPB
2004
132views more  CMPB 2004»
13 years 7 months ago
Design and implementation of software for assembly and browsing of 3D brain atlases
: Visualization software for three dimensional digital brain atlases present many challenges in design and implementation. These challenges include the design of an effective human...
Carl Gustafson, Oleh J. Tretiak, Louise Bertrand, ...