Sciweavers

458 search results - page 3 / 92
» Symbolic Object Code Analysis
Sort
View
COGSCI
2010
85views more  COGSCI 2010»
13 years 7 months ago
The Effects of Feature-Label-Order and Their Implications for Symbolic Learning
Symbols enable people to organize and communicate about the world. However, the ways in which symbolic knowledge is learned and then represented in the mind are poorly understood....
Michael Ramscar, Daniel Yarlett, Melody Dye, Katie...
SIGSOFT
2003
ACM
14 years 8 months ago
ARCHER: using symbolic, path-sensitive analysis to detect memory access errors
Memory corruption errors lead to non-deterministic, elusive crashes. This paper describes ARCHER (ARray CHeckER) a static, effective memory access checker. ARCHER uses path-sensit...
Yichen Xie, Andy Chou, Dawson R. Engler
ESORICS
2011
Springer
12 years 7 months ago
Linear Obfuscation to Combat Symbolic Execution
Abstract. Trigger-based code (malicious in many cases, but not necessarily) only executes when specific inputs are received. Symbolic execution has been one of the most powerful t...
Zhi Wang, Jiang Ming, Chunfu Jia, Debin Gao
WWW
2006
ACM
14 years 8 months ago
Using symbolic objects to cluster web documents
Web Clustering is useful for several activities in the WWW, from automatically building web directories to improve retrieval performance. Nevertheless, due to the huge size of the...
Esteban Meneses, Oldemar Rodríguez-Rojas
ICASSP
2009
IEEE
14 years 2 months ago
High-rate distributed multi-source cooperation using complex field coding
A multisource cooperative protocol is developed capable of achieving diversity order up to the number of cooperating users at a high throughput. In this design each source jointly...
Alfonso Cano Pleite, Jesús Gómez-Vil...