Sciweavers

224 search results - page 25 / 45
» Program Counter Based Techniques for Dynamic Power Managemen...
Sort
View
WORM
2003
13 years 8 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
GLVLSI
2003
IEEE
119views VLSI» more  GLVLSI 2003»
14 years 21 days ago
Simultaneous peak and average power minimization during datapath scheduling for DSP processors
The use of multiple supply voltages for energy and average power reduction is well researched and several works have appeared in the literature. However, in low power design using...
Saraju P. Mohanty, N. Ranganathan, Sunil K. Chappi...
ACMICEC
2008
ACM
270views ECommerce» more  ACMICEC 2008»
13 years 9 months ago
Adaptive strategies for predicting bidding prices in supply chain management
Supply Chain Management (SCM) involves a number of interrelated activities from negotiating with suppliers to competing for customer orders and scheduling the manufacturing proces...
Yevgeniya Kovalchuk, Maria Fasli
CDC
2008
IEEE
204views Control Systems» more  CDC 2008»
14 years 1 months ago
Dynamic ping optimization for surveillance in multistatic sonar buoy networks with energy constraints
— In this paper we study the problem of dynamic optimization of ping schedule in an active sonar buoy network deployed to provide persistent surveillance of a littoral area throu...
Anshu Saksena, I-Jeng Wang
BIOCOMP
2006
13 years 8 months ago
Acceleration of Covariance Models for Non-coding RNA Search
Stochastic context-free grammar (SCFG) based models for non-coding RNA (ncRNA) gene searches are much more powerful than regular grammar based models due to the ability to model in...
Scott F. Smith 0002