Sciweavers

4307 search results - page 585 / 862
» Dynamic Spyware Analysis
Sort
View
ICCAD
2001
IEEE
128views Hardware» more  ICCAD 2001»
14 years 7 months ago
An Assembly-Level Execution-Time Model for Pipelined Architectures
The aim of this work is to provide an elegant and accurate static execution timing model for 32-bit microprocessor instruction sets, covering also inter–instruction effects. Suc...
Giovanni Beltrame, Carlo Brandolese, William Forna...
HYBRID
2009
Springer
14 years 5 months ago
Safe and Secure Networked Control Systems under Denial-of-Service Attacks
Abstract. We consider the problem of security constrained optimal control for discrete-time, linear dynamical systems in which control and measurement packets are transmitted over ...
Saurabh Amin, Alvaro A. Cárdenas, Shankar S...
VMCAI
2009
Springer
14 years 5 months ago
Mostly-Functional Behavior in Java Programs
We present a lightweight type-and-effect system for Java programs that features two major innovations over extant object-oriented effects systems: initialization effects, which ...
William C. Benton, Charles N. Fischer
CCECE
2009
IEEE
14 years 5 months ago
Application layer optimization for efficient video streaming over IEEE 802.11 based wireless networks
— Most of the existing video streaming systems employ the worst case analysis in application layer buffer size dimensioning. Even though the worst case buffer size dimensioning p...
Azfar Moid, Abraham O. Fapojuwo
DATE
2009
IEEE
129views Hardware» more  DATE 2009»
14 years 5 months ago
Energy minimization for real-time systems with non-convex and discrete operation modes
—We present an optimal methodology for dynamic voltage scheduling problem in the presence of realistic assumption such as leakage-power and intra-task overheads. Our contribution...
Foad Dabiri, Alireza Vahdatpour, Miodrag Potkonjak...