Sciweavers

1629 search results - page 214 / 326
» Infeasible Code Detection
Sort
View
VEE
2006
ACM
106views Virtualization» more  VEE 2006»
15 years 7 months ago
Using VMM-based sensors to monitor honeypots
Virtual Machine Monitors (VMMs) are a common tool for implementing honeypots. In this paper we examine the implementation of a VMM-based intrusion detection and monitoring system ...
Kurniadi Asrigo, Lionel Litty, David Lie
ASPLOS
2011
ACM
14 years 5 months ago
Improving the performance of trace-based systems by false loop filtering
Trace-based compilation is a promising technique for language compilers and binary translators. It offers the potential to expand the compilation scopes that have traditionally be...
Hiroshige Hayashizaki, Peng Wu, Hiroshi Inoue, Mau...
ICSE
2008
IEEE-ACM
16 years 1 months ago
MimEc: intelligent user notification of faults in the eclipse IDE
The earlier in the software process a fault is detected, the cheaper the cost of fixing the fault. Automated fault detection tools can provide developers with information througho...
Lucas Layman, Laurie A. Williams, Robert St. Amant
136
Voted
IEEEARES
2008
IEEE
15 years 8 months ago
Type and Effect Annotations for Safe Memory Access in C
In this paper, we present a novel type and effect analysis for detecting memory errors in C source code. We extend the standard C type system with effect, region, and host annotat...
Syrine Tlili, Mourad Debbabi
VTC
2008
IEEE
196views Communications» more  VTC 2008»
15 years 8 months ago
Block Equalization and Generalized MLSE Arbitration for the HSPA WCDMA Uplink
Abstract— High Speed Packet Access (HSPA), the latest evolution of the Wideband Code Division Multiple Access (WCDMA) standard, provides higher uplink data rates using higher-ord...
Gregory E. Bottomley