Sciweavers

420 search results - page 14 / 84
» Dynamic program analysis of Microsoft Windows applications
Sort
View
ACMSE
2009
ACM
14 years 2 months ago
Applying randomized projection to aid prediction algorithms in detecting high-dimensional rogue applications
This paper describes a research effort to improve the use of the cosine similarity information retrieval technique to detect unknown, known or variances of known rogue software by...
Travis Atkison
ICCAD
2001
IEEE
185views Hardware» more  ICCAD 2001»
14 years 4 months ago
Application-Driven Processor Design Exploration for Power-Performance Trade-off Analysis
1 - This paper presents an efficient design exploration environment for high-end core processors. The heart of the proposed design exploration framework is a two-level simulation e...
Diana Marculescu, Anoop Iyer
CGO
2010
IEEE
14 years 2 months ago
Large program trace analysis and compression with ZDDs
Prior work has shown that reduced, ordered, binary decision diagrams (BDDs) can be a powerful tool for program trace analysis and visualization. Unfortunately, it can take hours o...
Graham D. Price, Manish Vachharajani
BMCBI
2010
139views more  BMCBI 2010»
13 years 7 months ago
RNAstructure: software for RNA secondary structure prediction and analysis
Background: To understand an RNA sequence's mechanism of action, the structure must be known. Furthermore, target RNA structure is an important consideration in the design of...
Jessica S. Reuter, David H. Mathews
ACSAC
2007
IEEE
14 years 1 months ago
Automated Vulnerability Analysis: Leveraging Control Flow for Evolutionary Input Crafting
We present an extension of traditional "black box" fuzz testing using a genetic algorithm based upon a Dynamic Markov Model fitness heuristic. This heuristic allows us t...
Sherri Sparks, Shawn Embleton, Ryan Cunningham, Cl...