Sciweavers

1017 search results - page 96 / 204
» On the Power of k -Consistency
Sort
View
WORM
2003
13 years 11 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
GLVLSI
2010
IEEE
168views VLSI» more  GLVLSI 2010»
13 years 10 months ago
A revisit to voltage partitioning problem
We revisit voltage partitioning problem when the mapped voltages of functional units are predetermined. If energy consumption is estimated by formulation E = CV 2 , a published wo...
Tao Lin, Sheqin Dong, Bei Yu, Song Chen, Satoshi G...
ENTCS
2007
79views more  ENTCS 2007»
13 years 10 months ago
Fault Detection in Multi-Threaded C++ Server Applications
Due to increasing demands in processing power on the one hand, but the physical limit on CPU clock speed on the other hand, multi-threaded programming is becoming more important i...
Arndt Mühlenfeld, Franz Wotawa
NA
2008
71views more  NA 2008»
13 years 10 months ago
Numerical evaluation of a fixed-amplitude variable-phase integral
We treat the evaluation of a fixed-amplitude variable-phase integral of the form b a exp[ikG(x)]dx, where G (x) 0 and has moderate differentiability in the integration interval. ...
J. N. Lyness
SIAMJO
2002
99views more  SIAMJO 2002»
13 years 9 months ago
Active Sets, Nonsmoothness, and Sensitivity
Nonsmoothness pervades optimization, but the way it typically arises is highly structured. Nonsmooth behavior of an objective function is usually associated, locally, with an activ...
A. S. Lewis