Sciweavers

96 search results - page 4 / 20
» How Fast Can Higher-Order Masking Be in Software
Sort
View
POPL
2006
ACM
14 years 6 months ago
Certified assembly programming with embedded code pointers
Embedded code pointers (ECPs) are stored handles of functions and continuations commonly seen in low-level binaries as well as functional or higher-order programs. ECPs are known ...
Zhaozhong Ni, Zhong Shao
IFL
2005
Springer
207views Formal Methods» more  IFL 2005»
13 years 11 months ago
A Dependently Typed Framework for Static Analysis of Program Execution Costs
Abstract. This paper considers the use of dependent types to capture information about dynamic resource usage in a static type system. Dependent types allow us to give (explicit) p...
Edwin Brady, Kevin Hammond
WCRE
1995
IEEE
13 years 9 months ago
On Finding Duplication and Near-Duplication in Large Software Systems
This paper describes how a program called dup can be used to locate instances of duplication or nearduplication in a software system. D u p reports both textually identical sectio...
Brenda S. Baker
WWW
2011
ACM
13 years 20 days ago
Web scale NLP: a case study on url word breaking
This paper uses the URL word breaking task as an example to elaborate what we identify as crucialin designingstatistical natural language processing (NLP) algorithmsfor Web scale ...
Kuansan Wang, Christopher Thrasher, Bo-June Paul H...
IH
1999
Springer
13 years 10 months ago
A Stochastic Approach to Content Adaptive Digital Image Watermarking
This paper presents a new stochastic approach which can be applied with di erent watermark techniques. The approach is based on the computation of a Noise Visibility Function NVF...
Sviatoslav Voloshynovskiy, Alexander Herrigel, Naz...