Sciweavers

351 search results - page 32 / 71
» Generating Java trace data
Sort
View
ICC
2009
IEEE
117views Communications» more  ICC 2009»
13 years 6 months ago
NetCluster: A Clustering-Based Framework for Internet Tomography
In this paper, Internet data collected via passive measurement are analyzed to obtain localization information on nodes by clustering (i.e., grouping together) nodes that exhibit s...
Elena Baralis, Andrea Bianco, Tania Cerquitelli, L...
SP
2009
IEEE
262views Security Privacy» more  SP 2009»
14 years 3 months ago
Automatic Reverse Engineering of Malware Emulators
Malware authors have recently begun using emulation technology to obfuscate their code. They convert native malware binaries into bytecode programs written in a randomly generated...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...
ASWEC
2007
IEEE
14 years 14 days ago
Influence Control for Dynamic Reconfiguration
Influence control is a very challenging issue in dynamic reconfiguration and still not well addressed in the literature. This paper argues that dynamic reconfiguration influences s...
Zhikun Zhao, Wei Li
CAV
2010
Springer
201views Hardware» more  CAV 2010»
14 years 10 days ago
Contessa: Concurrency Testing Augmented with Symbolic Analysis
Testing of multi-threaded programs poses enormous challenges. To improve the coverage of testing, we present a framework named CONTESSA that augments conventional testing (concrete...
Sudipta Kundu, Malay K. Ganai, Chao Wang
IPPS
2003
IEEE
14 years 1 months ago
Wrapping Legacy Codes for Grid-Based Applications
This paper describes a process for the semi-automatic conversion of numerical and scientific routines written in the C programming language into Triana-based computational servic...
Yan Huang, Ian Taylor, David W. Walker, Robert Dav...