Sciweavers

452 search results - page 37 / 91
» Symbolic Execution of Behavioral Requirements
Sort
View
HPCA
2005
IEEE
15 years 11 months ago
Transition Phase Classification and Prediction
Most programs are repetitive, where similar behavior can be seen at different execution times. Proposed on-line systems automatically group these similar intervals of execution in...
Jeremy Lau, Stefan Schoenmackers, Brad Calder
98
Voted
DAGSTUHL
1998
15 years 9 days ago
Active-U-Datalog: Integrating Active Rules in a Logical Update Language
Deductive database technology represents an important step towards the goal of developing highly-declarative database programming languages. In order to make deductive databases a ...
Elisa Bertino, Barbara Catania, Vincenzo Gervasi, ...
112
Voted
SP
2010
IEEE
194views Security Privacy» more  SP 2010»
15 years 2 months ago
Identifying Dormant Functionality in Malware Programs
—To handle the growing flood of malware, security vendors and analysts rely on tools that automatically identify and analyze malicious code. Current systems for automated malwar...
Paolo Milani Comparetti, Guido Salvaneschi, Engin ...
POPL
2004
ACM
15 years 11 months ago
Global value numbering using random interpretation
We present a polynomial time randomized algorithm for global value numbering. Our algorithm is complete when conditionals are treated as non-deterministic and all operators are tr...
Sumit Gulwani, George C. Necula
101
Voted
ISCA
2012
IEEE
244views Hardware» more  ISCA 2012»
13 years 1 months ago
Scheduling heterogeneous multi-cores through performance impact estimation (PIE)
Single-ISA heterogeneous multi-core processors are typically composed of small (e.g., in-order) power-efficient cores and big (e.g., out-of-order) high-performance cores. The eff...
Kenzo Van Craeynest, Aamer Jaleel, Lieven Eeckhout...