Sciweavers

1629 search results - page 231 / 326
» Infeasible Code Detection
Sort
View
103
Voted
INFORMATICALT
2006
102views more  INFORMATICALT 2006»
15 years 1 months ago
Parallel DEM Software for Simulation of Granular Media
The paper describes the development and performance of parallel algorithms for the discrete element method (DEM) software. Spatial domain decomposition strategy and message passing...
Algirdas Maknickas, Arnas Kaceniauskas, Rimantas K...
FMSD
2007
133views more  FMSD 2007»
15 years 1 months ago
Static priority scheduling of event-triggered real-time embedded systems
Real-time embedded systems are often specified as a collection of independent tasks, each generating a sequence of event-triggered code blocks, and the scheduling in this domain ...
Cagkan Erbas, Andy D. Pimentel, Selin Cerav-Erbas
PR
2008
145views more  PR 2008»
15 years 1 months ago
Probabilistic suffix models for API sequence analysis of Windows XP applications
Given the pervasive nature of malicious mobile code (viruses, worms, etc.), developing statistical/structural models of code execution is of considerable importance. We investigat...
Geoffrey Mazeroff, Jens Gregor, Michael G. Thomaso...
CORR
2004
Springer
140views Education» more  CORR 2004»
15 years 1 months ago
Checking modes of HAL programs
Recent constraint logic programming (CLP) languages, such as HAL and Mercury, require type, mode and determinism declarations for predicates. This information allows the generatio...
Maria J. García de la Banda, Warwick Harvey...
GLOBECOM
2010
IEEE
14 years 11 months ago
Authenticating MIMO Transmissions Using Channel-Like Fingerprinting
Abstract-- A framework for introducing an extrinsic fingerprint signal to space-time coded transmissions at the physical-layer is presented, whereby the fingerprint signal conveys ...
Nate Goergen, W. Sabrina Lin, K. J. Ray Liu, T. Ch...