Sciweavers

1821 search results - page 258 / 365
» Security-Aware Program Transformations
Sort
View
LCPC
2007
Springer
15 years 7 months ago
Multidimensional Blocking in UPC
Abstract. Partitioned Global Address Space (PGAS) languages offer an attractive, high-productivity programming model for programming large-scale parallel machines. PGAS languages, ...
Christopher Barton, Calin Cascaval, George Alm&aac...
94
Voted
PDCAT
2007
Springer
15 years 7 months ago
A Distributed Virtual Machine for Parallel Graph Reduction
We present the architecture of nreduce, a distributed virtual machine which uses parallel graph reduction to run programs across a set of computers. It executes code written in a ...
Peter M. Kelly, Paul D. Coddington, Andrew L. Wend...
88
Voted
SAS
2007
Springer
106views Formal Methods» more  SAS 2007»
15 years 7 months ago
Guided Static Analysis
In static analysis, the semantics of the program is expressed as a set ions. The equations are solved iteratively over some abstract domain. If ract domain is distributive and sati...
Denis Gopan, Thomas W. Reps
134
Voted
DRM
2005
Springer
15 years 6 months ago
Control flow based obfuscation
A software obfuscator is a program O to transform a source program P for protection against malicious reverse engineering. O should be correct (O(P) has same functionality with P)...
Jun Ge, Soma Chaudhuri, Akhilesh Tyagi
81
Voted
ICDM
2003
IEEE
91views Data Mining» more  ICDM 2003»
15 years 6 months ago
MPIS: Maximal-Profit Item Selection with Cross-Selling Considerations
In the literature of data mining, many different algorithms for association rule mining have been proposed. However, there is relatively little study on how association rules can ...
Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang