Sciweavers

2068 search results - page 388 / 414
» On Effectiveness of Application-Layer Coding
Sort
View
SP
2007
IEEE
135views Security Privacy» more  SP 2007»
15 years 10 months ago
Exploring Multiple Execution Paths for Malware Analysis
Malicious code (or malware) is defined as software that fulfills the deliberately harmful intent of an attacker. Malware analysis is the process of determining the behavior and ...
Andreas Moser, Christopher Krügel, Engin Kird...
ICS
2007
Tsinghua U.
15 years 10 months ago
Adaptive Strassen's matrix multiplication
Strassen’s matrix multiplication (MM) has benefits with respect to any (highly tuned) implementations of MM because Strassen’s reduces the total number of operations. Strasse...
Paolo D'Alberto, Alexandru Nicolau
133
Voted
LCTRTS
2007
Springer
15 years 10 months ago
Scratchpad allocation for data aggregates in superperfect graphs
Existing methods place data or code in scratchpad memory, i.e., SPM by either relying on heuristics or resorting to integer programming or mapping it to a graph coloring problem. ...
Lian Li 0002, Quan Hoang Nguyen, Jingling Xue
145
Voted
RAID
2007
Springer
15 years 10 months ago
SpyShield: Preserving Privacy from Spy Add-Ons
Spyware infections are becoming extremely pervasive, posing a grave threat to Internet users’ privacy. Control of such an epidemic is increasingly difficult for the existing def...
Zhuowei Li, XiaoFeng Wang, Jong Youl Choi
BIBE
2006
IEEE
119views Bioinformatics» more  BIBE 2006»
15 years 10 months ago
Large Grain Size Stochastic Optimization Alignment
DNA sequence alignment is a critical step in identifying homology between organisms. The most widely used alignment program, ClustalW, is known to suffer from the local minima pro...
Perry Ridge, Hyrum Carroll, Dan Sneddon, Mark J. C...