Sciweavers

1594 search results - page 120 / 319
» Visualizing Program Executions on Large Data Sets
Sort
View
SP
2009
IEEE
262views Security Privacy» more  SP 2009»
15 years 9 months ago
Automatic Reverse Engineering of Malware Emulators
Malware authors have recently begun using emulation technology to obfuscate their code. They convert native malware binaries into bytecode programs written in a randomly generated...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...
POPL
2010
ACM
16 years 9 days ago
Dynamically Checking Ownership Policies in Concurrent C/C++ Programs
Concurrent programming errors arise when threads share data incorrectly. Programmers often avoid these errors by using synchronization to enforce a simple ownership policy: data i...
Jean-Phillipe Martin, Michael Hicks, Manuel Costa,...
ESA
1998
Springer
162views Algorithms» more  ESA 1998»
15 years 6 months ago
External Memory Algorithms
Abstract. Data sets in large applications are often too massive to t completely inside the computer's internal memory. The resulting input output communication or I O between ...
Jeffrey Scott Vitter
IADIS
2004
15 years 4 months ago
OLAP in enterprise decision modelling
This paper describes the application of online analytical processing (OLAP) in the field of data mining. We discuss knowledge discovery in enterprise databases as well as data war...
Perihan Kilimci, Bora Gökçe, Oya Kalip...
ICML
2007
IEEE
16 years 3 months ago
Multiclass core vector machine
Even though several techniques have been proposed in the literature for achieving multiclass classification using Support Vector Machine(SVM), the scalability aspect of these appr...
S. Asharaf, M. Narasimha Murty, Shirish Krishnaj S...