Results 91 to 100 of about 11,256 (247)

Enhancing intrusion detection against denial of service and distributed denial of service attacks: Leveraging extended Berkeley packet filter and machine learning algorithms

open access: yesIET Communications, Volume 19, Issue 1, January/December 2025.
Abstract As organizations increasingly rely on network services, the prevalence and severity of Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks have emerged as significant threats. The cornerstone of effectively addressing these challenges lies in the timely and precise detection capabilities offered by advanced intrusion ...
Nemalikanti Anand   +5 more
wiley   +1 more source

Machine-specific optimization methods for C/C++ applications that are distributed in the LLVM intermediate representation format

open access: yesТруды Института системного программирования РАН, 2018
This paper analyzes approaches for optimizing C/C++ applications used in twostage compilation system, allowing distributing such applications in the LLVM (low level virtual machine) intermediate representation.
Sh. F. Kurmangaleev
doaj  

Dynamic analysis of virtualization- and dispatching-obfuscated applications

open access: yesТруды Института системного программирования РАН, 2018
Obfuscation algorithms are now widely used to prevent software reverse engineering. Binary code virtualization is one of the most powerful obfuscations technics.
M. G. Bakulin   +5 more
doaj   +1 more source

Cross‐Platform Based Scalable 3D Media Sequence Playback Framework Architecture

open access: yesElectronics Letters, Volume 61, Issue 1, January/December 2025.
This paper presents a novel study on a web playback framework designed to efficiently render stereoscopic 3D media content across various platforms within web environments. We propose a scalable 3D media web playback framework (S3WPF) that leverages advanced encoding technology.
Kwangmu Shin, Sunghoon Kim
wiley   +1 more source

Copy-paste semantic errors detection

open access: yesТруды Института системного программирования РАН, 2018
The paper describes a method for semantic errors detection arising during incorrect code copy-paste made by the developer. The method consists of two basic parts. The first part detects code clones based on lexical analysis of the program.
Sevak Sargsyan
doaj   +1 more source

libVersioningCompiler: An easy-to-use library for dynamic generation and invocation of multiple code versions

open access: yesSoftwareX, 2018
We present libVersioningCompiler, a C++ library designed to support the dynamic generation of multiple versions of the same compute kernel in a HPC scenario.
S. Cherubin, G. Agosta
doaj   +1 more source

Ithemal: Accurate, Portable and Fast Basic Block Throughput Estimation using Deep Neural Networks

open access: yes, 2019
Predicting the number of clock cycles a processor takes to execute a block of assembly instructions in steady state (the throughput) is important for both compiler designers and performance engineers.
Amarasinghe, Saman   +3 more
core  

libRoadRunner 2.0: a high performance SBML simulation and analysis library. [PDF]

open access: yesBioinformatics, 2023
Welsh C   +5 more
europepmc   +1 more source

Static analysis usage for customizable checks of programming languages semantic constraints

open access: yesТруды Института системного программирования РАН, 2018
We describe the usage of programming language constraints to achieve program security and portability, which are especially important for large projects.
Valery Ignatyev
doaj  

Home - About - Disclaimer - Privacy