Sciweavers

1061 search results - page 166 / 213
» A general definition of malware
Sort
View
ICASSP
2011
IEEE
14 years 3 months ago
Discriminative Training for direct minimization of deletion, insertion and substitution errors
In this paper, we follow the minimum error principle for acoustic modeling and formulate error objectives in insertion, deletion, and substitution separately for minimization duri...
Sunghwan Shin, Ho-Young Jung, Biing-Hwang Juang
ICFP
2005
ACM
15 years 11 months ago
Modular verification of concurrent assembly code with dynamic thread creation and termination
Proof-carrying code (PCC) is a general framework that can, in principle, verify safety properties of arbitrary machine-language programs. Existing PCC systems and typed assembly l...
Xinyu Feng, Zhong Shao
STOC
2009
ACM
99views Algorithms» more  STOC 2009»
16 years 13 days ago
Testing juntas nearly optimally
A function on n variables is called a k-junta if it depends on at most k of its variables. In this article, we show that it is possible to test whether a function is a k-junta or ...
Eric Blais
POPL
2008
ACM
16 years 4 days ago
Imperative self-adjusting computation
Self-adjusting computation enables writing programs that can automatically and efficiently respond to changes to their data (e.g., inputs). The idea behind the approach is to stor...
Umut A. Acar, Amal Ahmed, Matthias Blume
POPL
2008
ACM
16 years 4 days ago
A theory of platform-dependent low-level software
The C language definition leaves the sizes and layouts of types partially unspecified. When a C program makes assumptions about type layout, its semantics is defined only on platf...
Marius Nita, Dan Grossman, Craig Chambers