Sciweavers

2006 search results - page 315 / 402
» Heuristic Security-Testing Methods
Sort
View
GECCO
2007
Springer
171views Optimization» more  GECCO 2007»
14 years 3 months ago
Concept-based multi-objective problems and their solution by EC
Recent studies on the support of engineers during conceptual design resulted in a non-traditional type of Multi-Objective Problems (MOPs), namely concept-based ones. In concept-ba...
Amiram Moshaiov, Gideon Avigad
OOPSLA
2007
Springer
14 years 3 months ago
Software speculative multithreading for Java
We apply speculative multithreading to sequential Java programs in software to achieve speedup on existing multiprocessors. A common speculation library supports both Java bytecod...
Christopher J. F. Pickett
RAID
2007
Springer
14 years 3 months ago
Emulation-Based Detection of Non-self-contained Polymorphic Shellcode
Network-level emulation has recently been proposed as a method for the accurate detection of previously unknown polymorphic code injection attacks. In this paper, we extend network...
Michalis Polychronakis, Kostas G. Anagnostakis, Ev...
SCOPES
2007
Springer
14 years 3 months ago
Operating system integrated energy aware scratchpad allocation strategies for multiprocess applications
Various scratchpad allocation strategies have been developed in the past. Most of them target the reduction of energy consumption. These approaches share the necessity of having d...
Robert Pyka, Christoph Faßbach, Manish Verma...
CIBCB
2006
IEEE
14 years 3 months ago
A Systematic Computational Approach for Transcription Factor Target Gene Prediction
— Computational prediction of transcription factor’s binding sites and regulatory target genes has great value to the biological studies of cellular process. Existing practices...
Ji He, Xinbin Dai, Xuechun Zhao