Sciweavers

4307 search results - page 138 / 862
» Dynamic Spyware Analysis
Sort
View
ISCAS
2002
IEEE
130views Hardware» more  ISCAS 2002»
14 years 3 months ago
Analysis of limit cycle stability in a tap-changing transformer
The paper analyses the nature of limit cycles induced through the interaction of transformer tap changing and load dynamics. Linearization of a Poincar´e map is used to prove loc...
Vaibhav Donde, Ian A. Hiskens
ICCAD
2005
IEEE
134views Hardware» more  ICCAD 2005»
14 years 3 months ago
Fast thermal simulation for architecture level dynamic thermal management
As power density increases exponentially, runtime regulation of operating temperature by dynamic thermal managements becomes necessary. This paper proposes a novel approach to the...
Pu Liu, Zhenyu Qi, Hang Li, Lingling Jin, Wei Wu, ...
ACSAC
2010
IEEE
13 years 8 months ago
Cujo: efficient detection and prevention of drive-by-download attacks
The JavaScript language is a core component of active and dynamic web content in the Internet today. Besides its great success in enhancing web applications, however, JavaScript p...
Konrad Rieck, Tammo Krueger, Andreas Dewald
ISSTA
2012
ACM
12 years 18 days ago
Measuring enforcement windows with symbolic trace interpretation: what well-behaved programs say
A static analysis design is sufficient if it can prove the property of interest with an acceptable number of false alarms. Ultimately, the only way to confirm that an analysis d...
Devin Coughlin, Bor-Yuh Evan Chang, Amer Diwan, Je...
PASTE
2004
ACM
14 years 3 months ago
Evaluating the imprecision of static analysis
This work discusses two non-traditional approaches for evaluating the imprecision of static analysis. The approaches are based on proofs of feasibility or infeasibility that are c...
Atanas Rountev, Scott Kagan, Michael Gibas