Sciweavers

2000 search results - page 333 / 400
» Program Transformation and Proof Transformation
Sort
View
197
Voted
WCRE
2010
IEEE
15 years 1 months ago
Reverse Engineering Self-Modifying Code: Unpacker Extraction
—An important application of binary-level reverse engineering is in reconstructing the internal logic of computer malware. Most malware code is distributed in encrypted (or “pa...
Saumya K. Debray, Jay Patel
GRAPHICSINTERFACE
2009
15 years 1 months ago
Separability of spatial manipulations in multi-touch interfaces
Multi-touch interfaces allow users to translate, rotate, and scale digital objects in a single interaction. However, this freedom represents a problem when users intend to perform...
Miguel A. Nacenta, Patrick Baudisch, Hrvoje Benko,...
203
Voted
COR
2011
14 years 10 months ago
MIP models for connected facility location: A theoretical and computational study
This article comprises the first theoretical and computational study on mixed integer programming (MIP) models for the connected facility location problem (ConFL). ConFL combines...
Stefan Gollowitzer, Ivana Ljubic
97
Voted
TCAD
2010
130views more  TCAD 2010»
14 years 10 months ago
On ATPG for Multiple Aggressor Crosstalk Faults
Crosstalk faults have emerged as a significant mechanism for circuit failure. Long signal nets are of particular concern because they tend to have a higher coupling capacitance to...
Kunal P. Ganeshpure, Sandip Kundu
223
Voted
ASPLOS
2011
ACM
14 years 7 months ago
Dynamic knobs for responsive power-aware computing
We present PowerDial, a system for dynamically adapting application behavior to execute successfully in the face of load and power fluctuations. PowerDial transforms static con...
Henry Hoffmann, Stelios Sidiroglou, Michael Carbin...