Sciweavers

26354 search results - page 5053 / 5271
» How we refactor, and how we know it
Sort
View
CCS
2009
ACM
15 years 8 months ago
Finding bugs in exceptional situations of JNI programs
Software flaws in native methods may defeat Java’s guarantees of safety and security. One common kind of flaws in native methods results from the discrepancy on how exceptions...
Siliang Li, Gang Tan
CCS
2009
ACM
15 years 8 months ago
Large-scale malware indexing using function-call graphs
A major challenge of the anti-virus (AV) industry is how to effectively process the huge influx of malware samples they receive every day. One possible solution to this problem i...
Xin Hu, Tzi-cker Chiueh, Kang G. Shin
LCTRTS
2009
Springer
15 years 8 months ago
Addressing the challenges of DBT for the ARM architecture
Dynamic binary translation (DBT) can provide security, virtualization, resource management and other desirable services to embedded systems. Although DBT has many benefits, its r...
Ryan W. Moore, José Baiocchi, Bruce R. Chil...
DATE
2009
IEEE
163views Hardware» more  DATE 2009»
15 years 8 months ago
Fixed points for multi-cycle path detection
—Accurate timing analysis is crucial for obtaining the optimal clock frequency, and for other design stages such as power analysis. Most methods for estimating propagation delay ...
Vijay D'Silva, Daniel Kroening
DEXAW
2009
IEEE
113views Database» more  DEXAW 2009»
15 years 8 months ago
Identification of Surgery Indicators by Mining Hospital Data: A Preliminary Study
—The management of patient referrals is an interesting issue when it comes to predicting future patient demand to increase hospital productivity. In general, a patient is referre...
Marie Persson, Niklas Lavesson
« Prev « First page 5053 / 5271 Last » Next »