Results 31 to 40 of about 10,440 (199)

Intelligent intrusion detection in low power IoTs [PDF]

open access: yes, 2016
Security and privacy of data are one of the prime concerns in today’s Internet of Things (IoT). Conventional security techniques like signature-based detection of malware and regular updates of a signature database are not feasible solutions as they ...
Ahmadinia, Ali   +3 more
core   +1 more source

Building an obfuscation compiler based on LLVM infrastructure

open access: yesТруды Института системного программирования РАН, 2018
The paper describes the obfuscating transformations, which were implemented while developing an LLVM-based obfuscating compiler in ISP RAS.  The proposed transformations are based on well-known obfuscation algorithms and are specifically improved to ...
V. P. Korchagin   +3 more
doaj   +1 more source

Towards Vulnerability Discovery Using Staged Program Analysis

open access: yes, 2016
Eliminating vulnerabilities from low-level code is vital for securing software. Static analysis is a promising approach for discovering vulnerabilities since it can provide developers early feedback on the code they write.
J Dean   +6 more
core   +1 more source

Engineering a static verification tool for GPU kernels [PDF]

open access: yes, 2014
We report on practical experiences over the last 2.5 years related to the engineering of GPUVerify, a static verification tool for OpenCL and CUDA GPU kernels, plotting the progress of GPUVerify from a prototype to a fully functional and relatively ...
A.F. Donaldson   +13 more
core   +1 more source

Dynamic compilation of SQL queries for PostgreSQL

open access: yesТруды Института системного программирования РАН, 2018
In recent years, as performance and capacity of main and external memory grow, performance of database management systems (DBMSes) on certain kinds of queries is more determined by raw CPU speed.
R. A. Buchatskiy   +5 more
doaj   +1 more source

SMT-based Distributed Bounded Model Checking in Spark [PDF]

open access: yesJisuanji gongcheng, 2017
The credibility of program verification results and the verification efficiency in Satisfiablity Modulo Theories(SMT)-based bounded model checking are influenced greatly by bounds.However,the traditional serial checking method cannot validate under the ...
REN Shengbing,ZHANG Jianwei,WU Bin,WANG Zhijian
doaj   +1 more source

Converting Binary Floating‐Point Numbers to Shortest Decimal Strings: An Experimental Review

open access: yesSoftware: Practice and Experience, Volume 56, Issue 4, Page 462-478, April 2026.
ABSTRACT Background When sharing or logging numerical data, we must convert binary floating‐point numbers into their decimal string representations. For example, the number π might become 3.1415927. Engineers have perfected many algorithms for producing such accurate, short strings.
Jaël Champagne Gareau, Daniel Lemire
wiley   +1 more source

Implementing implicit OpenMP data sharing on GPUs

open access: yes, 2017
OpenMP is a shared memory programming model which supports the offloading of target regions to accelerators such as NVIDIA GPUs. The implementation in Clang/LLVM aims to deliver a generic GPU compilation toolchain that supports both the native CUDA C/C++
Bataev, Alexey   +8 more
core   +1 more source

Code trolley: hardware-assisted control flow obfuscation [PDF]

open access: yes, 2020
Many cybersecurity attacks rely on analyzing a binary executable to find exploitable sections of code. Code obfuscation is used to prevent attackers from reverse engineering these executables.
Boskov, Novak   +2 more
core  

More Than 25 Years of CRAN

open access: yesAustralian &New Zealand Journal of Statistics, Volume 68, Issue 1, March 2026.
ABSTRACT We discuss the development of the package repository of CRAN, its design principles and how these are put into practice. We provide insights into how the regular and submission checks are organised and the actions resulting from these checks.
Kurt Hornik, Uwe Ligges
wiley   +1 more source

Home - About - Disclaimer - Privacy