Sciweavers

3544 search results - page 539 / 709
» Software Testing
Sort
View
IEEEARES
2010
IEEE
14 years 5 months ago
Program Obfuscation by Strong Cryptography
—Program obfuscation is often employed by malware in order to avoid detection by anti-virus software, but it has many other legitimate uses, such as copy protection, software lic...
Zeljko Vrba, Pål Halvorsen, Carsten Griwodz
FASE
2010
Springer
14 years 5 months ago
Analyzing the Impact of Change in Multi-threaded Programs
We introduce a technique for debugging multi-threaded C programs and analyzing the impact of source code changes, and its implementation in the prototype tool Direct. Our approach ...
Krishnendu Chatterjee, Luca de Alfaro, Vishwanath ...
ASWEC
2009
IEEE
14 years 5 months ago
Component Coordination in GLoo
Incorporating components from a number of different sources into a given application is generally considered to be a non-trivial activity. Over the years, various coordination mec...
Jean-Guy Schneider, Markus Lumpe
FASE
2009
Springer
14 years 5 months ago
HAVE: Detecting Atomicity Violations via Integrated Dynamic and Static Analysis
Abstract. The reality of multi-core hardware has made concurrent programs pervasive. Unfortunately, writing correct concurrent programs is difficult. Atomicity violation, which is ...
Qichang Chen, Liqiang Wang, Zijiang Yang, Scott D....
FPGA
2009
ACM
201views FPGA» more  FPGA 2009»
14 years 5 months ago
A high-performance FPGA architecture for restricted boltzmann machines
Despite the popularity and success of neural networks in research, the number of resulting commercial or industrial applications have been limited. A primary cause of this lack of...
Daniel L. Ly, Paul Chow