Sciweavers

4233 search results - page 118 / 847
» Three Paths to Effectiveness
Sort
View
SP
2007
IEEE
135views Security Privacy» more  SP 2007»
15 years 10 months ago
Exploring Multiple Execution Paths for Malware Analysis
Malicious code (or malware) is defined as software that fulfills the deliberately harmful intent of an attacker. Malware analysis is the process of determining the behavior and ...
Andreas Moser, Christopher Krügel, Engin Kird...
149
Voted
ICCAD
1995
IEEE
135views Hardware» more  ICCAD 1995»
15 years 7 months ago
An iterative improvement algorithm for low power data path synthesis
We address the problem of minimizing power consumption in behavioral synthesis of data-dominated circuits. The complex nature of power as a cost function implies that the effects ...
Anand Raghunathan, Niraj K. Jha
149
Voted
BMCBI
2010
187views more  BMCBI 2010»
15 years 4 months ago
PathEx: a novel multi factors based datasets selector web tool
Background: Microarray experiments have become very popular in life science research. However, if such experiments are only considered independently, the possibilities for analysi...
Eric Bareke, Michael Pierre, Anthoula Gaigneaux, B...
135
Voted
TASLP
2008
96views more  TASLP 2008»
15 years 4 months ago
Fast Tracing of Acoustic Beams and Paths Through Visibility Lookup
The beam tracing method can be used for the fast tracing of a large number of acoustic paths through a direct lookup of a special tree-like data structure (beam tree) that describe...
Fabio Antonacci, M. Foco, Augusto Sarti, Stefano T...
SIGMETRICS
2011
ACM
229views Hardware» more  SIGMETRICS 2011»
14 years 7 months ago
Model-driven optimization of opportunistic routing
Opportunistic routing aims to improve wireless performance by exploiting communication opportunities arising by chance. A key challenge in opportunistic routing is how to achieve ...
Eric Rozner, Mi Kyung Han, Lili Qiu, Yin Zhang