In the area of monitoring communication networks, GEDSystem is a tool for supporting the development of programs driven to the management of domains that may show up when networks ...
Abstract. Code obfuscations are semantics-preserving code transformations used to protect a program from reverse engineering. There is generally no expectation of complete, long-te...
Abstract. Matching is a basic operation extensively used in computation. Second-order matching, in particular, provides an adequate environment for expressing program transformatio...
Abstract. Vessels supplying malignant tumors are abnormally shaped. This paper describes a blinded study that assessed tumor malignancy by analyzing vessel shape within MR images o...
Elizabeth Bullitt, Inkyung Jung, Keith E. Muller, ...
We present SoftExplorer, a tool to estimate and analyze the power and energy consumption of an algorithm from the C program. The consumption of every loop is analyzed, and the inï¬...
Eric Senn, Johann Laurent, Nathalie Julien, Eric M...