Sciweavers

785 search results - page 123 / 157
» Embedding a Forest in a Graph
Sort
View
ACSAC
2008
IEEE
14 years 3 months ago
STILL: Exploit Code Detection via Static Taint and Initialization Analyses
We propose STILL, a generic defense based on Static Taint and InitiaLization anaLyses, to detect exploit code embedded in data streams/requests targeting at various Internet servi...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu
CC
2004
Springer
14 years 2 months ago
Using Multiple Memory Access Instructions for Reducing Code Size
An important issue in embedded systems design is the size of programs. As computing devices decrease in size, yet with more and more functions, better code size optimizations are i...
Neil Johnson, Alan Mycroft
CAD
2007
Springer
13 years 9 months ago
A spectral approach to shape-based retrieval of articulated 3D models
We present an approach for robust shape retrieval from databases containing articulated 3D models. Each shape is represented by the eigenvectors of an appropriately defined affin...
Varun Jain, Hao Zhang 0002
ECRTS
2009
IEEE
13 years 6 months ago
Precise Worst-Case Execution Time Analysis for Processors with Timing Anomalies
This paper explores timing anomalies in WCET analysis. Timing anomalies add to the complexity of WCET analysis and make it hard to apply divide-and-conquer strategies to simplify ...
Raimund Kirner, Albrecht Kadlec, Peter P. Puschner
DAC
1999
ACM
14 years 10 months ago
Constraint Driven Code Selection for Fixed-Point DSPs
Abstract? Fixed-point DSPs are a class of embedded processors with highly irregular architectures. This irregularity makes it difficult to generate high-quality machine code from p...
Steven Bashford, Rainer Leupers