Sciweavers

1452 search results - page 112 / 291
» Algorithmic Analysis of Array-Accessing Programs
Sort
View
105
Voted
ISQED
2007
IEEE
152views Hardware» more  ISQED 2007»
15 years 6 months ago
Variation Aware Timing Based Placement Using Fuzzy Programming
In nanometer regime, the effects of variations are having an increasing impact on the delay and power characteristics of devices as well as the yield of the circuit. Statistical t...
Venkataraman Mahalingam, N. Ranganathan
CGO
2003
IEEE
15 years 5 months ago
Hiding Program Slices for Software Security
Given the high cost of producing software, development of technology for prevention of software piracy is important for the software industry. In this paper we present a novel app...
Xiangyu Zhang, Rajiv Gupta
107
Voted
BMCBI
2008
172views more  BMCBI 2008»
15 years 17 days ago
Classification of drug molecules considering their IC50 values using mixed-integer linear programming based hyper-boxes method
Background: A priori analysis of the activity of drugs on the target protein by computational approaches can be useful in narrowing down drug candidates for further experimental t...
Pelin Armutlu, Muhittin Emre Ozdemir, Fadime Ü...
ESA
1998
Springer
162views Algorithms» more  ESA 1998»
15 years 4 months ago
External Memory Algorithms
Abstract. Data sets in large applications are often too massive to t completely inside the computer's internal memory. The resulting input output communication or I O between ...
Jeffrey Scott Vitter
PEPM
2010
ACM
15 years 9 months ago
Context-sensitive analysis of obfuscated x86 executables
A method for context-sensitive analysis of binaries that may have obfuscated procedure call and return operations is presented. Such binaries may use operators to directly manipul...
Arun Lakhotia, Davidson R. Boccardo, Anshuman Sing...