Sciweavers

674 search results - page 92 / 135
» Explanation Based Program Transformation
Sort
View
NDSS
2008
IEEE
15 years 4 months ago
Impeding Malware Analysis Using Conditional Code Obfuscation
Malware programs that incorporate trigger-based behavior initiate malicious activities based on conditions satisfied only by specific inputs. State-of-the-art malware analyzers ...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...
FSTTCS
2008
Springer
14 years 10 months ago
A Hierarchy of Semantics for Non-deterministic Term Rewriting Systems
ABSTRACT. Formalisms involving some degree of nondeterminism are frequent in computer science. In particular, various programming or specification languages are based on term rewr...
Juan Rodríguez-Hortalá
IEEEPACT
2008
IEEE
15 years 4 months ago
Exploiting loop-dependent stream reuse for stream processors
The memory access limits the performance of stream processors. By exploiting the reuse of data held in the Stream Register File (SRF), an on-chip storage, the number of memory acc...
Xuejun Yang, Ying Zhang, Jingling Xue, Ian Rogers,...
ISI
2007
Springer
15 years 3 months ago
Design and Implementation of a Middleware for Sentient Spaces
— Surveillance is an important task for guaranteeing the security of individuals. Being able to intelligently monitor the activity in given spaces is essential to achieve such su...
Bijit Hore, Hojjat Jafarpour, Ramesh Jain, Shengyu...
DFG
2004
Springer
15 years 3 months ago
Executable HybridUML and Its Application to Train Control Systems
Abstract. In this paper, the authors introduce an extension of UML for the purpose of hybrid systems modeling. The construction uses the profile mechanism of UML 2.0 which is the ...
Kirsten Berkenkötter, Stefan Bisanz, Ulrich H...