Sciweavers

1270 search results - page 203 / 254
» Improving Code Density Using Compression Techniques
Sort
View
SP
2010
IEEE
194views Security Privacy» more  SP 2010»
14 years 19 days ago
Identifying Dormant Functionality in Malware Programs
—To handle the growing flood of malware, security vendors and analysts rely on tools that automatically identify and analyze malicious code. Current systems for automated malwar...
Paolo Milani Comparetti, Guido Salvaneschi, Engin ...
ISBI
2004
IEEE
14 years 9 months ago
Nanoparticle-Enhanced Proton Computed Tomography: A Monte Carlo Simulation Study
Proton computed tomography (pCT) has the potential to improve the accuracy of proton treatment planning, which is currently based on x-ray computed tomography (xCT). However, at t...
Reinhard Schulte, Vladimir Bashkirov, David Willia...
MOBICOM
2006
ACM
14 years 2 months ago
Distributed channel management in uncoordinated wireless environments
Wireless 802.11 hotspots have grown in an uncoordinated fashion with highly variable deployment densities. Such uncoordinated deployments, coupled with the difficulty of implemen...
Arunesh Mishra, Vivek Shrivastava, Dheeraj Agrawal...
WCRE
2008
IEEE
14 years 3 months ago
Detecting Clones in Business Applications
A business application automates a collection of business processes. A business process describes how a set of logically related tasks are executed, ordered and managed by followi...
Jin Guo, Ying Zou
COMPSAC
2007
IEEE
14 years 3 months ago
On Identifying Bug Patterns in Aspect-Oriented Programs
Bug patterns are erroneous code idioms or bad coding practices that have been proved fail time and time again. They mainly arise from the misunderstanding of language features, th...
Sai Zhang, Jianjun Zhao