• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 2,545
Next 10 →

GRASP - A New Search Algorithm for Satisfiability

by Joso L Marques Silva , 1996
"... This paper introduces GRASP (Generic seaRch Algorithm for the Satisjiability Problem), an integrated algorithmic framework for SAT that un.$es several previously proposed searchpruning techniques and facilitates ident$cation of additional ones. GRASP is premised on the inevitability of confzicts dur ..."
Abstract - Cited by 449 (34 self) - Add to MetaCart
that are necessary for a solution to be found. fiperimental results obtained from a large number of benchmarks, including many from the $eld of test pattern generation, indicate that application of the proposed confzict analysis techniques to SATalgorithm can be extremely effectivefor a large number

Behavioral theories and the neurophysiology of reward,

by Wolfram Schultz - Annu. Rev. Psychol. , 2006
"... ■ Abstract The functions of rewards are based primarily on their effects on behavior and are less directly governed by the physics and chemistry of input events as in sensory systems. Therefore, the investigation of neural mechanisms underlying reward functions requires behavioral theories that can ..."
Abstract - Cited by 187 (0 self) - Add to MetaCart
■ Abstract The functions of rewards are based primarily on their effects on behavior and are less directly governed by the physics and chemistry of input events as in sensory systems. Therefore, the investigation of neural mechanisms underlying reward functions requires behavioral theories

Non-Failure Analysis for Logic Programs

by Saumya Debray, Pedro López-García, Manuel Hermenegildo - ACM Transactions on Programming Languages and Systems , 1997
"... We provide a method whereby, given mode and (upper approximation) type information, we can detect procedures and goals that can be guaranteed to not fail (i.e., to produce at least one solution or not terminate). The technique is based on an intuitively very simple notion, that of a (set of) tests & ..."
Abstract - Cited by 130 (14 self) - Add to MetaCart
We provide a method whereby, given mode and (upper approximation) type information, we can detect procedures and goals that can be guaranteed to not fail (i.e., to produce at least one solution or not terminate). The technique is based on an intuitively very simple notion, that of a (set of) tests

Towards automatic generation of vulnerability-based signatures

by David Brumley, James Newsome, Dawn Song, Hao Wang, Somesh Jha , 2006
"... In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic variants. Our work departs from previous approaches by focusing on the semantics of the program and vulnerability exerci ..."
Abstract - Cited by 153 (28 self) - Add to MetaCart
such as constraint solving for automatically generating vulnerability signatures. We have built a prototype system to test our techniques. Our experiments show that we can automatically generate a vulnerability signature using a single exploit which is of much higher quality than previous exploit-based signatures

Performance of Firefly RPC

by Michael D. Schroeder, Michael Burrows - ACM TRANSACTIONS ON COMPUTER SYSTEMS , 1990
"... In this paper we report on the performance of the remote procedure call (RPC) implementation for the Firefly multiprocessor and analyze the implementation to account precisely for all measured latency. From the analysis and measurements, we estimate how much faster RPC could be if certain improvemen ..."
Abstract - Cited by 148 (1 self) - Add to MetaCart
. These measurements are for RPCs from user space on one machine to user space on another, using the installed system and a 10 Mbit/s Ethernet. The RPC packet exchange protocol is built on IP/UDP, and the times include calculating and verifying UDP checksums. The Fireflies used in the tests had 5 MicroVAX II

A Symbolic Execution Framework for JavaScript

by Prateek Saxena, Devdatta Akhawe, Steve Hanna, Feng Mao, Stephen Mccamant, Dawn Song - IEEE SYMPOSIUM ON SECURITY AND PRIVACY , 2010
"... As AJAX applications gain popularity, client-side JavaScript code is becoming increasingly complex. However, few automated vulnerability analysis tools for JavaScript exist. In this paper, we describe the first system for exploring the execution space of JavaScript code using symbolic execution. To ..."
Abstract - Cited by 133 (12 self) - Add to MetaCart
As AJAX applications gain popularity, client-side JavaScript code is becoming increasingly complex. However, few automated vulnerability analysis tools for JavaScript exist. In this paper, we describe the first system for exploring the execution space of JavaScript code using symbolic execution

Molecular dynamics simulations of biomolecules,”

by Martin Karplus , J Andrew Mccammon - Nat Struct Biol, , 2002
"... It has been 25 years since the first molecular dynamics simulation of a macromolecule of biological interest was published 1 . The simulation concerned the bovine pancreatic trypsin inhibitor (BPTI), which has served as the 'hydrogen molecule' of protein dynamics because of its small size ..."
Abstract - Cited by 143 (3 self) - Add to MetaCart
' -transmuting the potential from that representing one system to another during a simulation -in the calculation of free energy differences There are three types of applications of simulation methods in the macromolecular area, as well as in other areas involving mesoscopic systems. The first uses simulation

Evolutionary Pursuit and Its Application to Face Recognition

by Chengjun Liu, Harry Wechsler - IEEE TRANS. PATTERN ANALYSIS AND MACHINE INTELLIGENCE , 2000
"... This paper introduces Evolutionary Pursuit (EP) as a novel and adaptive representation method for image encoding and classification. In analogy to projection pursuit methods, EP seeks to learn an optimal basis for the dual purpose of data compression and pattern classification. The challenge for EP ..."
Abstract - Cited by 102 (11 self) - Add to MetaCart
strategies characteristic of genetic algorithms (GAs) for searching the space of possible solutions to determine the optimal basis. EP starts by projecting the original data into a lower dimensional whitened Principal Component Analysis (PCA) space. Directed but random rotations of the basis vectors

Meta Optimization: Improving Compiler Heuristics with Machine Learning

by Mark Stephenson, Saman Amarasinghe, Martin Martin, Una-May O'Reilly - In Proceedings of the ACM SIGPLAN ’03 Conference on Programming Language Design and Implementation , 2002
"... Compiler writers have crafted many heuristics over the years to (approximately) solve NP-hard problems efficiently. Finding a heuristic that performs well on a broad range of applications is a tedious and difficult process. This paper introduces Meta Optimization, a methodology for automatically fin ..."
Abstract - Cited by 116 (6 self) - Add to MetaCart
. The best general-purpose heuristic our system found improved Trimaran's hyperblock selection algorithm by an average of 25% on our training set, and 9% on a completely unrelated test set. We further test the applicability of our system on Trimaran's priority-based coloring register allocator

Addressing shared resource contention in multicore processors via scheduling

by Sergey Zhuravlev, Sergey Blagodurov, Alexandra Fedorova - In Proceedings of the 15th edition of ASPLOS on Architectural
"... Contention for shared resources on multicore processors remains an unsolved problem in existing systems despite significant research efforts dedicated to this problem in the past. Previous solutions focused primarily on hardware techniques and software page coloring to mitigate this problem. Our goa ..."
Abstract - Cited by 122 (5 self) - Add to MetaCart
Contention for shared resources on multicore processors remains an unsolved problem in existing systems despite significant research efforts dedicated to this problem in the past. Previous solutions focused primarily on hardware techniques and software page coloring to mitigate this problem. Our
Next 10 →
Results 1 - 10 of 2,545
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University