Sciweavers

1629 search results - page 186 / 326
» Infeasible Code Detection
Sort
View
IEEEPACT
2008
IEEE
15 years 8 months ago
Redundancy elimination revisited
This work proposes and evaluates improvements to previously known algorithms for redundancy elimination. Enhanced Scalar Replacement combines two classic techniques, scalar replac...
Keith D. Cooper, Jason Eckhardt, Ken Kennedy
IOLTS
2008
IEEE
102views Hardware» more  IOLTS 2008»
15 years 8 months ago
Integrating Scan Design and Soft Error Correction in Low-Power Applications
— Error correcting coding is the dominant technique to achieve acceptable soft-error rates in memory arrays. In many modern circuits, the number of memory elements in the random ...
Michael E. Imhof, Hans-Joachim Wunderlich, Christi...
SP
2008
IEEE
144views Security Privacy» more  SP 2008»
15 years 8 months ago
Cloaker: Hardware Supported Rootkit Concealment
Rootkits are used by malicious attackers who desire to run software on a compromised machine without being detected. They have become stealthier over the years as a consequence of...
Francis M. David, Ellick Chan, Jeffrey C. Carlyle,...
SP
2007
IEEE
107views Security Privacy» more  SP 2007»
15 years 7 months ago
Lurking in the Shadows: Identifying Systemic Threats to Kernel Data
The integrity of kernel code and data is fundamental to the integrity of the computer system. Tampering with the kernel data is an attractive venue for rootkit writers since malic...
Arati Baliga, Pandurang Kamat, Liviu Iftode
CANDC
2002
ACM
15 years 1 months ago
Applications of Recursive Segmentation to the Analysis of DNA Sequences
Recursive segmentation is a procedure that partitions a DNA sequence into domains with a homogeneous composition of the four nucleotides A, C, G and T. This procedure can also be ...
Wentian Li, Pedro Bernaola-Galván, Fatameh ...