Sciweavers

1008 search results - page 127 / 202
» Multiobjective process controllability analysis
Sort
View
VIROLOGY
2010
179views more  VIROLOGY 2010»
13 years 7 months ago
Automatic binary deobfuscation
Abstract. This paper gives an overview of our research in the automation of the process of software protection analysis. We will focus more particularly on the problem of obfuscati...
Yoann Guillot, Alexandre Gazet
DAC
2008
ACM
14 years 10 months ago
Stochastic modeling of a thermally-managed multi-core system
Achieving high performance under a peak temperature limit is a first-order concern for VLSI designers. This paper presents a new model of a thermally-managed system, where a stoch...
Hwisung Jung, Peng Rong, Massoud Pedram
GECCO
2005
Springer
139views Optimization» more  GECCO 2005»
14 years 2 months ago
Use of a genetic algorithm in brill's transformation-based part-of-speech tagger
The tagging problem in natural language processing is to find a way to label every word in a text as a particular part of speech, e.g., proper noun. An effective way of solving th...
Garnett Carl Wilson, Malcolm I. Heywood
ISQED
2010
IEEE
141views Hardware» more  ISQED 2010»
14 years 3 months ago
Assessing chip-level impact of double patterning lithography
—Double patterning lithography (DPL) provides an attractive alternative or a supplementary method to enable the 32nm and 22nm process nodes, relative to costlier technology optio...
Kwangok Jeong, Andrew B. Kahng, Rasit Onur Topalog...
ISW
2007
Springer
14 years 3 months ago
Detecting System Emulators
Malware analysis is the process of determining the behavior and purpose of a given malware sample (such as a virus, worm, or Trojan horse). This process is a necessary step to be a...
Thomas Raffetseder, Christopher Krügel, Engin...