Sciweavers

553 search results - page 36 / 111
» Verified, Executable Parsing
Sort
View
DAC
2009
ACM
15 years 8 months ago
Endosymbiotic computing: enabling surrogate GUI and cyber-physical connectivity
Endosymbiotic Computing entails attaching an RF-enabled microcontroller module (endomodule) to an appliance such that it appears as a networked device in the cyber world. It enabl...
Pai H. Chou
ANLP
2000
126views more  ANLP 2000»
15 years 3 months ago
Compound Noun Segmentation Based on Lexical Data Extracted from Corpus
Compound noun analysis is one of the crucial problems in Korean language processing because a series of nouns in Korean may appear without white space in real texts, which makes i...
Juntae Yoon
RV
2007
Springer
74views Hardware» more  RV 2007»
15 years 8 months ago
Rollback Atomicity
We introduce a new non-interference criterion for concurrent programs: rollback atomicity. Similarly to other definitions of atomicity, rollback atomicity of a given concurrent ex...
Serdar Tasiran, Tayfun Elmas
HASE
1999
IEEE
15 years 6 months ago
Analyzing the Real-Time Properties of a U.S. Navy Signal Processing System
The state of the art in verifying the real-time requirements of applications developed using general processing graph models relies on simulation or off-line scheduling. We extend...
Steve Goddard, Kevin Jeffay
WORM
2003
15 years 3 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...