Sciweavers

2957 search results - page 326 / 592
» Code analysis and CS-XML
Sort
View
ACSAC
2007
IEEE
15 years 10 months ago
MetaAware: Identifying Metamorphic Malware
Detection of malicious software (malware) by the use of static signatures is often criticized for being overly simplistic. Available methods of obfuscating code (so-called metamor...
Qinghua Zhang, Douglas S. Reeves
CODES
2007
IEEE
15 years 10 months ago
Locality optimization in wireless applications
There is a strong need now for compilers of embedded systems to find effective ways of optimizing series of loop-nests, wherein majority of the memory references occur in the fo...
Javed Absar, Min Li, Praveen Raghavan, Andy Lambre...
ECBS
2007
IEEE
144views Hardware» more  ECBS 2007»
15 years 10 months ago
DP-Miner: Design Pattern Discovery Using Matrix
Design patterns document expert design experience in software system development. They have been applied in many existing software systems. However, pattern information is general...
Jing Dong, Dushyant S. Lad, Yajing Zhao
SCAM
2007
IEEE
15 years 10 months ago
Quality Assessment for Embedded SQL
—The access of information systems to underlying relational databases is commonly programmed using embedded SQL queries. Such embedded queries may take the form of string literal...
Huib van den Brink, Rob van der Leek, Joost Visser
ICIP
2007
IEEE
15 years 10 months ago
Software Pipelines Design for Variable Block-Size Motion Estimation with Large Search Range
This paper presents some techniques for efficient motion estimation (ME) implementation on fixed-point digital signal processor (DSP) for high resolution video coding. First, chal...
Zhigang Yang, Wen Gao, Yan Liu, Debin Zhao