Sciweavers

5790 search results - page 887 / 1158
» Distributed programming with distributed authorization
Sort
View
188
Voted
WCRE
2010
IEEE
15 years 26 days ago
Reverse Engineering Self-Modifying Code: Unpacker Extraction
—An important application of binary-level reverse engineering is in reconstructing the internal logic of computer malware. Most malware code is distributed in encrypted (or “pa...
Saumya K. Debray, Jay Patel
142
Voted
ICSE
2010
IEEE-ACM
15 years 13 days ago
Syde: a tool for collaborative software development
Team collaboration is essential for the success of multi-developer projects. When team members are spread across different locations, individual awareness of the activity of other...
Lile Hattori, Michele Lanza
MICRO
2010
IEEE
153views Hardware» more  MICRO 2010»
15 years 12 days ago
Scalable Speculative Parallelization on Commodity Clusters
While clusters of commodity servers and switches are the most popular form of large-scale parallel computers, many programs are not easily parallelized for execution upon them. In...
Hanjun Kim, Arun Raman, Feng Liu, Jae W. Lee, Davi...
JMLR
2012
13 years 5 months ago
Fast interior-point inference in high-dimensional sparse, penalized state-space models
We present an algorithm for fast posterior inference in penalized high-dimensional state-space models, suitable in the case where a few measurements are taken in each time step. W...
Eftychios A. Pnevmatikakis, Liam Paninski
139
Voted
JMLR
2012
13 years 5 months ago
High-Rank Matrix Completion
This paper considers the problem of completing a matrix with many missing entries under the assumption that the columns of the matrix belong to a union of multiple low-rank subspa...
Brian Eriksson, Laura Balzano, Robert Nowak