Sciweavers

1379 search results - page 52 / 276
» Dynamic Program Slicing in Understanding of Program Executio...
Sort
View
146
Voted
WETICE
1999
IEEE
15 years 6 months ago
Static Analysis of Binary Code to Isolate Malicious Behaviors
In this paper, we address the problem of static slicing on binary executables for the purposes of the malicious code detection in COTS components. By operating directly on binary ...
J. Bergeron, Mourad Debbabi, M. M. Erhioui, B&eacu...
145
Voted
ACSAC
2008
IEEE
15 years 9 months ago
Execution Trace-Driven Automated Attack Signature Generation
In its most general form, an attack signature is a program that can correctly determine if an input network packet sequence can successfully attack a protected network application...
Susanta Nanda, Tzi-cker Chiueh
ISMIR
2004
Springer
133views Music» more  ISMIR 2004»
15 years 8 months ago
Understanding Search Performance in Query-by-Humming Systems
Previous work in Query-by-Humming systems has left open many questions. Although a variety of techniques have been explored, there has been relatively little work to compare them ...
Roger B. Dannenberg, Ning Hu
EVOW
2010
Springer
15 years 7 months ago
Evolving Dynamic Trade Execution Strategies Using Grammatical Evolution
Abstract. Although there is a plentiful literature on the use of evolutionary methodologies for the trading of financial assets, little attention has been paid to potential use of...
Wei Cui, Anthony Brabazon, Michael O'Neill
AAAI
2008
15 years 4 months ago
Efficient Memoization for Dynamic Programming with Ad-Hoc Constraints
We address the problem of effective reuse of subproblem solutions in dynamic programming. In dynamic programming, a memoed solution of a subproblem can be reused for another if th...
Joxan Jaffar, Andrew E. Santosa, Razvan Voicu