Sciweavers

3456 search results - page 189 / 692
» Byte Code Engineering
Sort
View
JMLR
2006
132views more  JMLR 2006»
15 years 3 months ago
Learning to Detect and Classify Malicious Executables in the Wild
We describe the use of machine learning and data mining to detect and classify malicious executables as they appear in the wild. We gathered 1,971 benign and 1,651 malicious execu...
Jeremy Z. Kolter, Marcus A. Maloof
227
Voted
ISCA
2011
IEEE
522views Hardware» more  ISCA 2011»
14 years 7 months ago
CPPC: correctable parity protected cache
Due to shrinking feature sizes processors are becoming more vulnerable to soft errors. Write-back caches are particularly vulnerable since they hold dirty data that do not exist i...
Mehrtash Manoochehri, Murali Annavaram, Michel Dub...
AOSD
2007
ACM
15 years 7 months ago
Expressive programs through presentation extension
Most approaches to programming language extensibility have worked by pairing syntactic extension with semantic extension. We present an approach that works through a combination o...
Andrew David Eisenberg, Gregor Kiczales
AOSD
2012
ACM
13 years 11 months ago
Reusing non-functional concerns across languages
Emerging languages are often source-to-source compiled to mainstream ones, which offer standardized, fine-tuned implementations of non-functional concerns (NFCs)—including pers...
Myoungkyu Song, Eli Tilevich
127
Voted
ICSE
2008
IEEE-ACM
16 years 3 months ago
Continuous software quality supervision using SourceInventory and Columbus
Several tools and methods for source code quality assurance based on static analysis finally reached a state when they are applicable in practice and recognized by the industry. H...
Árpád Beszédes, Rudolf Ferenc...