Sciweavers

1629 search results - page 4 / 326
» Infeasible Code Detection
Sort
View
SIGSOFT
2008
ACM
14 years 8 months ago
Marple: a demand-driven path-sensitive buffer overflow detector
Despite increasing efforts in detecting and managing software security vulnerabilities, the number of security attacks is still rising every year. As software becomes more complex...
Wei Le, Mary Lou Soffa
ICCAD
1997
IEEE
129views Hardware» more  ICCAD 1997»
13 years 12 months ago
A fast and robust exact algorithm for face embedding
We present a new matrix formulation of the face hypercube embedding problem that motivates the design of an efficient search strategy to find an encoding that satisfies all fac...
Evguenii I. Goldberg, Tiziano Villa, Robert K. Bra...
PPOPP
2011
ACM
12 years 10 months ago
ScalaExtrap: trace-based communication extrapolation for spmd programs
Performance modeling for scientific applications is important for assessing potential application performance and systems procurement in high-performance computing (HPC). Recent ...
Xing Wu, Frank Mueller
HPCC
2005
Springer
14 years 1 months ago
A Loop-Aware Search Strategy for Automated Performance Analysis
Abstract. Automated online search is a powerful technique for performance diagnosis. Such a search can change the types of experiments it performs while the program is running, mak...
Eli D. Collins, Barton P. Miller
TSP
2008
87views more  TSP 2008»
13 years 7 months ago
Joint Data Detection and Channel Tracking for OFDM Systems With Phase Noise
This paper addresses the problem of data detection in orthogonal frequency division multiplexing (OFDM) systems operating under a time-varying multipath fading channel. Optimal det...
Stelios Stefanatos, Aggelos K. Katsaggelos