Sciweavers

CEAS
2008
Springer
13 years 6 months ago
Empirical research on IP blacklisting
This paper describes two innovative analysis methods for IPv4 address sets such as antispam blacklists. First, the contents analysis provides means of measuring key properties of ...
Christian Dietrich, Christian Rossow
CC
2008
Springer
172views System Software» more  CC 2008»
13 years 6 months ago
Efficient Context-Sensitive Shape Analysis with Graph Based Heap Models
The performance of heap analysis techniques has a significant impact on their utility in an optimizing compiler. Most shape analysis techniques perform interprocedural dataflow ana...
Mark Marron, Manuel V. Hermenegildo, Deepak Kapur,...
CAV
2008
Springer
108views Hardware» more  CAV 2008»
13 years 6 months ago
Reducing Concurrent Analysis Under a Context Bound to Sequential Analysis
This paper addresses the analysis of concurrent programs with shared memory. Such an analysis is undecidable in the presence of multiple procedures. One approach used in recent wor...
Akash Lal, Thomas W. Reps
WSC
2007
13 years 7 months ago
Code analysis and CS-XML
The automated analysis of model specifications is an area that historically receives little attention in the simulation research community but which can offer significant bene...
Kara A. Olson, C. Michael Overstreet, E. Joseph De...
TAPSOFT
1995
Springer
13 years 8 months ago
Comparing Flow-Based Binding-Time Analyses
Abstract. Binding-time analyses based on flow analysis have been presented by Bondorf, Consel, Bondorf and Jørgensen, and Schwartzbach and the present author. The analyses are fo...
Jens Palsberg
FPCA
1995
13 years 8 months ago
Once Upon a Type
A number of useful optimisations are enabled if we can determine when a value is accessed at most once. We extend the Hindley-Milner type system with uses, yielding a typeinferenc...
David N. Turner, Philip Wadler, Christian Mossin
IPPS
2000
IEEE
13 years 8 months ago
Developing an Open Architecture for Performance Data Mining
Performance analysis of high performance systems is a difficult task. Current tools have proven successful in analysis tasks but their implementation is limited in several respects...
David B. Pierce, Diane T. Rover
ER
2000
Springer
139views Database» more  ER 2000»
13 years 8 months ago
Semantic Analysis Patterns
The development of object-oriented software starts from requirements expressed commonly as Use Cases. The requirements are then converted into a conceptual or analysis model. Analy...
Eduardo B. Fernández, Xiaohong Yuan
FSE
2006
Springer
89views Cryptology» more  FSE 2006»
13 years 8 months ago
The Impact of Carries on the Complexity of Collision Attacks on SHA-1
In this article we present a detailed analysis of the impact
Florian Mendel, Norbert Pramstaller, Christian Rec...
EDOC
2006
IEEE
13 years 8 months ago
Combining Analysis of Unstructured Workflows with Transformation to Structured Workflows
Abstract-- Analysis of workflows in terms of structural correctness is important for ensuring the quality of workflow models. Typically, this analysis is only one step in a larger ...
Rainer Hauser, Michael Friess, Jochen Malte Kü...