Sciweavers

9316 search results - page 160 / 1864
» Analysis of traceback techniques
Sort
View
ISSAC
2007
Springer
121views Mathematics» more  ISSAC 2007»
15 years 10 months ago
A comparative analysis of parallel disk-based Methods for enumerating implicit graphs
It is only in the last five years that researchers have begun to use disk-based search techniques on a large scale. The primary examples of its use come from symbolic algebra and...
Eric Robinson, Daniel Kunkle, Gene Cooperman
APVIS
2007
15 years 5 months ago
Visualization of sanitized email logs for spam analysis
Email has become an integral method of communication. However, it is still plagued by vast amounts of spam. Many statistical techniques, such as Bayesian filtering, have been app...
Chris Muelder, Kwan-Liu Ma
130
Voted
TC
2002
15 years 3 months ago
Multivariate Statistical Analysis of Audit Trails for Host-Based Intrusion Detection
Nong Ye, Syed Masum Emran, Qiang Chen, Sean Vilber...
252
Voted
ECOOP
2009
Springer
16 years 4 months ago
Scaling CFL-Reachability-Based Points-To Analysis Using Context-Sensitive Must-Not-Alias Analysis
Pointer analyses derived from a Context-Free-Language (CFL) reachability formulation achieve very high precision, but they do not scale well to compute the points-to solution for a...
Guoqing Xu, Atanas Rountev, Manu Sridharan
PLDI
1996
ACM
15 years 8 months ago
Commutativity Analysis: A New Analysis Framework for Parallelizing Compilers
This paper presents a new analysis technique, commutativity analysis, for automatically parallelizing computations that manipulate dynamic, pointer-based data structures. Commutat...
Martin C. Rinard, Pedro C. Diniz