Sciweavers

458 search results - page 58 / 92
» Symbolic Object Code Analysis
Sort
View
IWMM
2011
Springer
206views Hardware» more  IWMM 2011»
14 years 25 days ago
A comprehensive evaluation of object scanning techniques
At the heart of all garbage collectors lies the process of identifying and processing reference fields within an object. Despite its key role, and evidence of many different impl...
Robin Garner, Stephen M. Blackburn, Daniel Frampto...
VIROLOGY
2010
179views more  VIROLOGY 2010»
14 years 8 months ago
Automatic binary deobfuscation
Abstract. This paper gives an overview of our research in the automation of the process of software protection analysis. We will focus more particularly on the problem of obfuscati...
Yoann Guillot, Alexandre Gazet
CODES
2003
IEEE
15 years 3 months ago
Accurate estimation of cache-related preemption delay
Multitasked real-time systems often employ caches to boost performance. However the unpredictable dynamic behavior of caches makes schedulability analysis of such systems difficul...
Hemendra Singh Negi, Tulika Mitra, Abhik Roychoudh...
OOPSLA
2007
Springer
15 years 4 months ago
Understanding the value of program analysis tools
It is difficult to determine the cost effectiveness of program analysis tools because we cannot evaluate them in the same environment where we will be using the tool. Tool evalua...
Ciera Jaspan, I-Chin Chen, Anoop Sharma
KBSE
2007
IEEE
15 years 4 months ago
Finding errors in components that exchange xml data
Two or more components (e.g., objects, modules, or programs) interoperate when they exchange data, such as XML data. Using Application Programming Interface (API) calls exported b...
Mark Grechanik