Sciweavers

1911 search results - page 311 / 383
» Program analysis for code duplication in logic programs
Sort
View
ISW
2007
Springer
15 years 8 months ago
Detecting System Emulators
Malware analysis is the process of determining the behavior and purpose of a given malware sample (such as a virus, worm, or Trojan horse). This process is a necessary step to be a...
Thomas Raffetseder, Christopher Krügel, Engin...
ICDE
1993
IEEE
116views Database» more  ICDE 1993»
15 years 6 months ago
The Volcano Optimizer Generator: Extensibility and Efficient Search
Emerging database application domains demand not only new functionality but also high performance. To satisfy these two requirements, the Volcano project provides efficient, exten...
Goetz Graefe, William J. McKenna
APSCC
2006
IEEE
15 years 5 months ago
A Model-Driven Aspect Framework for Grid Service Development
Service-Oriented Architecture (SOA) plays an important role in the next generation computing models for scientific and commercial applications. But difficulties in the development...
WenJun Li, ChuWei Huang, QiangChao Chen, Hui Bian
GECCO
2006
Springer
206views Optimization» more  GECCO 2006»
15 years 5 months ago
A dynamically constrained genetic algorithm for hardware-software partitioning
In this article, we describe the application of an enhanced genetic algorithm to the problem of hardware-software codesign. Starting from a source code written in a high-level lan...
Pierre-André Mudry, Guillaume Zufferey, Gia...
ASM
2010
ASM
15 years 11 months ago
Lightweight Modeling of Java Virtual Machine Security Constraints
The Java programming language has been widely described as secure by design. Nevertheless, a number of serious security vulnerabilities have been discovered in Java, particularly i...
Mark C. Reynolds