Sciweavers

553 search results - page 36 / 111
» Verified, Executable Parsing
Sort
View
DAC
2009
ACM
14 years 3 months ago
Endosymbiotic computing: enabling surrogate GUI and cyber-physical connectivity
Endosymbiotic Computing entails attaching an RF-enabled microcontroller module (endomodule) to an appliance such that it appears as a networked device in the cyber world. It enabl...
Pai H. Chou
ANLP
2000
126views more  ANLP 2000»
13 years 10 months ago
Compound Noun Segmentation Based on Lexical Data Extracted from Corpus
Compound noun analysis is one of the crucial problems in Korean language processing because a series of nouns in Korean may appear without white space in real texts, which makes i...
Juntae Yoon
RV
2007
Springer
74views Hardware» more  RV 2007»
14 years 2 months ago
Rollback Atomicity
We introduce a new non-interference criterion for concurrent programs: rollback atomicity. Similarly to other definitions of atomicity, rollback atomicity of a given concurrent ex...
Serdar Tasiran, Tayfun Elmas
HASE
1999
IEEE
14 years 1 months ago
Analyzing the Real-Time Properties of a U.S. Navy Signal Processing System
The state of the art in verifying the real-time requirements of applications developed using general processing graph models relies on simulation or off-line scheduling. We extend...
Steve Goddard, Kevin Jeffay
WORM
2003
13 years 10 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...