Sciweavers

1342 search results - page 139 / 269
» Ordered Programs as Abductive Systems
Sort
View
VIROLOGY
2008
121views more  VIROLOGY 2008»
13 years 8 months ago
Constructing malware normalizers using term rewriting
A malware mutation engine is able to transform a malicious program to create a different version of the program. Such mutation engines are used at distribution sites or in self-pro...
Andrew Walenstein, Rachit Mathur, Mohamed R. Chouc...
FPL
2009
Springer
103views Hardware» more  FPL 2009»
13 years 6 months ago
Customizable domain-specific computing
In this article, we introduce the ongoing research in modeling and mapping for heterogeneous, customizable, parallel systems, as part of the effort in the newly established Center...
Jason Cong
PLDI
2009
ACM
14 years 3 months ago
Staged information flow for javascript
Modern websites are powered by JavaScript, a flexible dynamic scripting language that executes in client browsers. A common paradigm in such websites is to include third-party Ja...
Ravi Chugh, Jeffrey A. Meister, Ranjit Jhala, Sori...
IWPC
2005
IEEE
14 years 2 months ago
Understanding Object-Oriented Source Code from the Behavioural Perspective
Comprehension is a key activity that underpins a variety of software maintenance and engineering tasks. The task of understanding object-oriented systems is hampered by the fact t...
Neil Walkinshaw, Marc Roper, Murray Wood
ICMCS
1995
IEEE
115views Multimedia» more  ICMCS 1995»
14 years 15 days ago
Secure Pay-Per-View Testbed
Trials of Video on Demand and Pay-Per-View systems are underway in many countries, and as a result, many cable and telecommunications companies are having to upgrade or replace th...
Dónal Cunningham, Donal O'Mahony