Sciweavers

167 search results - page 33 / 34
» Safety checking of machine code
Sort
View
SIGSOFT
2007
ACM
14 years 7 months ago
Parallel test generation and execution with Korat
We present novel algorithms for parallel testing of code that takes structurally complex test inputs. The algorithms build on the Korat algorithm for constraint-based generation o...
Sasa Misailovic, Aleksandar Milicevic, Nemanja Pet...
STOC
2000
ACM
174views Algorithms» more  STOC 2000»
13 years 10 months ago
Noise-tolerant learning, the parity problem, and the statistical query model
We describe a slightly subexponential time algorithm for learning parity functions in the presence of random classification noise, a problem closely related to several cryptograph...
Avrim Blum, Adam Kalai, Hal Wasserman
POPL
1989
ACM
13 years 10 months ago
How to Make ad-hoc Polymorphism Less ad-hoc
raction that a programming language provides influences the structure and algorithmic complexity of the resulting programs: just imagine creating an artificial intelligence engine ...
Philip Wadler, Stephen Blott
USENIX
2007
13 years 8 months ago
Dynamic Spyware Analysis
Spyware is a class of malicious code that is surreptitiously installed on victims’ machines. Once active, it silently monitors the behavior of users, records their web surfing ...
Manuel Egele, Christopher Kruegel, Engin Kirda, He...
BMCBI
2006
116views more  BMCBI 2006»
13 years 6 months ago
HotSwap for bioinformatics: A STRAP tutorial
Background: Bioinformatics applications are now routinely used to analyze large amounts of data. Application development often requires many cycles of optimization, compiling, and...
Christoph Gille, Peter N. Robinson