Sciweavers

8177 search results - page 1475 / 1636
» Detecting System Emulators
Sort
View
114
Voted
ASPLOS
2008
ACM
15 years 5 months ago
SoftSig: software-exposed hardware signatures for code analysis and optimization
Many code analysis techniques for optimization, debugging, or parallelization need to perform runtime disambiguation of sets of addresses. Such operations can be supported efficie...
James Tuck, Wonsun Ahn, Luis Ceze, Josep Torrellas
110
Voted
CAV
2008
Springer
113views Hardware» more  CAV 2008»
15 years 5 months ago
Producing Short Counterexamples Using "Crucial Events"
Ideally, a model checking tool should successfully tackle state space explosion for complete system validation, while providing short counterexamples when an error exists. Techniqu...
Sujatha Kashyap, Vijay K. Garg
141
Voted
CBSE
2008
Springer
15 years 5 months ago
A Practical Approach for Finding Stale References in a Dynamic Service Platform
The OSGiTM Service Platform is becoming the de facto standard for modularized Java applications. The market of OSGi based COTS components is continuously growing. OSGi specific pro...
Kiev Gama, Didier Donsez
155
Voted
CEAS
2008
Springer
15 years 5 months ago
A Campaign-based Characterization of Spamming Strategies
This paper presents a methodology for the characterization of spamming strategies based on the identification of spam campaigns. To deeply understand how spammers abuse network re...
Pedro Calais, Douglas Pires, Dorgival Olavo Guedes...
117
Voted
CIKM
2008
Springer
15 years 5 months ago
A densitometric approach to web page segmentation
Web Page segmentation is a crucial step for many applications in Information Retrieval, such as text classification, de-duplication and full-text search. In this paper we describe...
Christian Kohlschütter, Wolfgang Nejdl
« Prev « First page 1475 / 1636 Last » Next »