Sciweavers

53390 search results - page 154 / 10678
» Computer Systems Analysis
Sort
View
ACSC
2006
IEEE
15 years 11 months ago
Manufacturing opaque predicates in distributed systems for code obfuscation
Code obfuscation is a relatively new technique of software protection and it works by deterring reverse engineering attempts by malicious users of software. The objective of obfus...
Anirban Majumdar, Clark D. Thomborson
ACIVS
2005
Springer
15 years 10 months ago
Identification of Intestinal Motility Events of Capsule Endoscopy Video Analysis
Abstract. Purpose: To develop a system for assisting the analysis of capsuleendoscopy (CE) video data and identifying sequences of frames related to small intestine motility. Mater...
Panagiota Spyridonos, Fernando Vilariño, Jo...
CPE
1994
Springer
170views Hardware» more  CPE 1994»
15 years 9 months ago
Automatic Scalability Analysis of Parallel Programs Based on Modeling Techniques
When implementingparallel programs forparallel computer systems the performancescalability of these programs should be tested and analyzed on different computer configurations and...
Allen D. Malony, Vassilis Mertsiotakis, Andreas Qu...
ICPPW
2002
IEEE
15 years 10 months ago
A Statistical Approach for the Analysis of the Relation Between Low-Level Performance Information, the Code, and the Environment
This paper presents a methodology for aiding a scientific programmer to evaluate the performance of parallel programs on advanced architectures. It applies well-defined design o...
Nayda G. Santiago, Diane T. Rover, Domingo Rodr&ia...
CONCUR
1997
Springer
15 years 9 months ago
Reachability Analysis of Pushdown Automata: Application to Model-Checking
We apply the symbolic analysis principle to pushdown systems. We represent (possibly in nite) sets of con gurations of such systems by means of nite-state automata. In order to re...
Ahmed Bouajjani, Javier Esparza, Oded Maler
« Prev « First page 154 / 10678 Last » Next »