Sciweavers

885 search results - page 122 / 177
» Large-scale behavioral targeting
Sort
View
JOCN
2010
104views more  JOCN 2010»
14 years 8 months ago
Spatial Attention Evokes Similar Activation Patterns for Visual and Auditory Stimuli
■ Neuroimaging studies suggest that a fronto-parietal network is activated when we expect visual information to appear at a specific spatial location. Here we examined whether a...
David V. Smith, Ben Davis, Kathy Niu, Eric W. Heal...
ASPLOS
2011
ACM
14 years 1 months ago
S2E: a platform for in-vivo multi-path analysis of software systems
This paper presents S2E, a platform for analyzing the properties and behavior of software systems. We demonstrate S2E’s use in developing practical tools for comprehensive perfo...
Vitaly Chipounov, Volodymyr Kuznetsov, George Cand...
ACNS
2009
Springer
157views Cryptology» more  ACNS 2009»
15 years 4 months ago
Malyzer: Defeating Anti-detection for Application-Level Malware Analysis
Abstract. Malware analysis is critical for malware detection and prevention. To defeat malware analysis and detection, today malware commonly adopts various sophisticated anti-dete...
Lei Liu, Songqing Chen
MICRO
2007
IEEE
167views Hardware» more  MICRO 2007»
15 years 4 months ago
Informed Microarchitecture Design Space Exploration Using Workload Dynamics
Program runtime characteristics exhibit significant variation. As microprocessor architectures become more complex, their efficiency depends on the capability of adapting with wor...
Chang-Burm Cho, Wangyuan Zhang, Tao Li
IEEEPACT
2002
IEEE
15 years 2 months ago
Workload Design: Selecting Representative Program-Input Pairs
Having a representative workload of the target domain of a microprocessor is extremely important throughout its design. The composition of a workload involves two issues: (i) whic...
Lieven Eeckhout, Hans Vandierendonck, Koenraad De ...