Sciweavers

172 search results - page 20 / 35
» HotComments: How to Make Program Comments More Useful
Sort
View
CCS
2010
ACM
13 years 7 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
ECAI
2004
Springer
14 years 1 months ago
Robust Solutions for Constraint Satisfaction and Optimization
Super solutions are a mechanism to provide robustness to constraint programs [10]. They are solutions in which, if a small number of variables lose their values, we are guaranteed ...
Emmanuel Hebrard, Brahim Hnich, Toby Walsh
CGA
1998
13 years 7 months ago
Principles for Information Visualization Spreadsheets
ns, with large, abstract, multidimensional data sets that are visually represented in multiple ways. We illustrate how spreadsheet techniques provide a structured, intuitive, and p...
Ed Huai-hsin Chi, John Riedl, Phillip Barry, Josep...
WCRE
2005
IEEE
14 years 1 months ago
Deobfuscation: Reverse Engineering Obfuscated Code
In recent years, code obfuscation has attracted attention as a low cost approach to improving software security by making it difficult for attackers to understand the inner worki...
Sharath K. Udupa, Saumya K. Debray, Matias Madou
HIPEAC
2005
Springer
14 years 1 months ago
Garbage Collection Hints
This paper shows that Appel-style garbage collectors often make suboptimal decisions both in terms of when and how to collect. We argue that garbage collection should be done when ...
Dries Buytaert, Kris Venstermans, Lieven Eeckhout,...