Sciweavers

1039 search results - page 48 / 208
» The Def-inite Approach to Dependency Analysis
Sort
View
ECRTS
2002
IEEE
15 years 6 months ago
Scope-Tree: A Program Representation for Symbolic Worst-Case Execution Time Analysis
Most WCET analysis techniques only provide an upper bound on the worst case execution time as a constant value. However, it often appears that the execution time of a piece of cod...
Antoine Colin, Guillem Bernat
COLING
1996
15 years 2 months ago
Analysis of Japanese Compound Nouns by Direct Text Scanning
This paper aims to analyze word dependency structure in compound nouns appearing in Japanese newspaper articles. The analysis is a dil't:icult problem because such compound n...
Toru Hisamitsu, Yoshihiko Nitta
NECO
2000
113views more  NECO 2000»
15 years 1 months ago
Geometric Analysis of Population Rhythms in Synaptically Coupled Neuronal Networks
We develop geometric dynamical systems methods to determine how various components contribute to a neuronal network's emergent population behavior. The results clarify the mu...
Jonathan E. Rubin, David Terman
CSFW
2005
IEEE
15 years 7 months ago
Analysis of Typed Analyses of Authentication Protocols
This paper contrasts two existing type-based techniques for the analysis of authentication protocols. The former, proposed by Gordon and Jeffrey, uses dependent types for nonces a...
Michele Bugliesi, Riccardo Focardi, Matteo Maffei
153
Voted
CAV
2011
Springer
216views Hardware» more  CAV 2011»
14 years 5 months ago
Malware Analysis with Tree Automata Inference
Abstract. The underground malware-based economy is flourishing and it is evident that the classical ad-hoc signature detection methods are becoming insufficient. Malware authors ...
Domagoj Babic, Daniel Reynaud, Dawn Song