Sciweavers

1379 search results - page 73 / 276
» codes 2009
Sort
View
DIMVA
2009
15 years 5 months ago
Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks
Drive-by download attacks are among the most common methods for spreading malware today. These attacks typically exploit memory corruption vulnerabilities in web browsers and brows...
Manuel Egele, Peter Wurzinger, Christopher Kruegel...
ICC
2009
IEEE
15 years 2 months ago
On the Interaction Between Channel Coding and Hierarchical Modulation
1 Classical systems using hierarchical modulation (such as DVB-SH) involve a "high-priority" (HP) and a "lowpriority" (LP) bit stream that are separately and in...
Seyed Mohammad Sajad Sadough, Pierre Duhamel
CC
2009
Springer
153views System Software» more  CC 2009»
16 years 4 months ago
Register Spilling and Live-Range Splitting for SSA-Form Programs
Register allocation decides which parts of a variable's live range are held in registers and which in memory. The compiler inserts spill code to move the values of variables b...
Matthias Braun, Sebastian Hack
SARA
2009
Springer
15 years 10 months ago
Modelling Equidistant Frequency Permutation Arrays in Constraints
Equidistant Frequency Permutation Arrays are combinatorial objects of interest in coding theory. A frequency permutation array is a type of constant composition code in which each...
Ian P. Gent, Paul McKay, Ian Miguel, Peter Nightin...
EUROPAR
2009
Springer
15 years 2 months ago
Argument Controlled Profiling
Profiling tools relate measurements to code context such as function names in order to guide code optimization. For a more detailed analysis, call path or phase-based profiling enh...
Tilman Küstner, Josef Weidendorfer, Tobias We...