Sciweavers

4722 search results - page 103 / 945
» Encoding Program Executions
Sort
View
ANSS
2006
IEEE
15 years 8 months ago
Performance Enhancement by Eliminating Redundant Function Execution
Programs often call the same function with the same arguments, yielding the same results. We call this phenomenon, “function reuse”. Previously, we have shown such a behavior ...
Peng Chen, Krishna M. Kavi, Robert Akl
IPPS
2006
IEEE
15 years 8 months ago
Modeling and executing master-worker applications in component models
— This paper describes work in progress to extend component models to support Master-Worker applications and to let them to be executed on Grid infrastructures. The proposed appr...
Hinde-Lilia Bouziane, Christian Pérez, Thie...
IWPC
2006
IEEE
15 years 8 months ago
Dynamic Analysis of Software Systems using Execution Pattern Mining
Software system analysis for extracting system functionality remains as a major problem in the reverse engineering literature and the early approaches mainly rely on static proper...
Hossein Safyallah, Kamran Sartipi
ISW
2004
Springer
15 years 7 months ago
The Obfuscation Executive
Abstract. Code obfuscations are semantics-preserving code transformations used to protect a program from reverse engineering. There is generally no expectation of complete, long-te...
Kelly Heffner, Christian S. Collberg
ICSE
2010
IEEE-ACM
15 years 7 months ago
Exemplar: EXEcutable exaMPLes ARchive
Searching for applications that are highly relevant to development tasks is challenging because the high-level intent reflected in the descriptions of these tasks doesn’t usual...
Mark Grechanik, Chen Fu, Qing Xie, Collin McMillan...