Sciweavers

224 search results - page 5 / 45
» Program Analysis Probably Counts
Sort
View
MINENET
2006
ACM
14 years 3 months ago
Forensic analysis of autonomous system reachability
Security incidents have an adverse impact not only on end systems, but also on Internet routing, resulting in many out-of-reach prefixes. Previous work has looked at performance ...
D. K. Lee, Sue B. Moon, Taesang Choi, Taesoo Jeong
DATE
2009
IEEE
189views Hardware» more  DATE 2009»
14 years 4 months ago
CUFFS: An instruction count based architectural framework for security of MPSoCs
—Multiprocessor System on Chip (MPSoC) architecture is rapidly gaining momentum for modern embedded devices. The vulnerabilities in software on MPSoCs are often exploited to caus...
Krutartha Patel, Sri Parameswaran, Roshan G. Ragel
LCN
2005
IEEE
14 years 3 months ago
Performance Analysis of Multi-Fiber Synchronous Photonic Share-per-link Packet Switches
A performance model is presented for an optical packet switch architecture in which the wavelength converters are shared per output link and each output link consists of multiple ...
Ayman G. Fayoumi, Fahad A. Al-Zahrani, Abdulgader ...
CHI
2008
ACM
13 years 11 months ago
Word usage and posting behaviors: modeling blogs with unobtrusive data collection methods
We present a large-scale analysis of the content of weblogs dating back to the release of the Blogger program in 1999. Over one million blogs were analyzed from their conception t...
Adam D. I. Kramer, Kerry Rodden
POPL
2007
ACM
14 years 10 months ago
Logic-flow analysis of higher-order programs
This work presents a framework for fusing flow analysis and theorem proving called logic-flow analysis (LFA). The framework itthe reduced product of two abstract interpretations: ...
Matthew Might