Sciweavers

9316 search results - page 150 / 1864
» Analysis of traceback techniques
Sort
View
PASTE
2004
ACM
15 years 9 months ago
Evaluating the imprecision of static analysis
This work discusses two non-traditional approaches for evaluating the imprecision of static analysis. The approaches are based on proofs of feasibility or infeasibility that are c...
Atanas Rountev, Scott Kagan, Michael Gibas
117
Voted
SERP
2007
15 years 5 months ago
Runtime Support of Speculative Optimization for Offline Escape Analysis
Escape analysis can improve the speed and memory efficiency of garbage collected languages by allocating objects to the call stack, but an offline analysis will potentially interf...
Kevin Cleereman, Michelle Cheatham, Krishnaprasad ...
FGCN
2008
IEEE
111views Communications» more  FGCN 2008»
15 years 10 months ago
Towards an Estimation of the Accuracy of TCP Reassembly in Network Forensics
Today, honeypot operators are strongly relying on network analysis tools to examine network traces collected in their honeynet environment. The accuracy of such analysis depends o...
Gérard Wagener, Alexandre Dulaunoy, Thomas ...
158
Voted
GW
2009
Springer
148views Biometrics» more  GW 2009»
15 years 1 months ago
On Gestural Variation and Coarticulation Effects in Sound Control
In this paper we focus on the analysis of sound producing gestures in the musical domain. We investigate the behavior of intraoral pressure exerted by a trumpet performer in the pr...
Tommaso Bianco, Vincent Freour, Nicolas H. Rasamim...
120
Voted
DAC
2007
ACM
16 years 4 months ago
Modeling the Function Cache for Worst-Case Execution Time Analysis
Static worst-case execution time (WCET) analysis is done by modeling the hardware behavior. In this paper we describe a WCET analysis technique to analyze systems with function ca...
Raimund Kirner, Martin Schoeberl