20,852 Hits in 5.9 sec

BEST: a Binary Executable Slicing Tool

Armel Mangean, Jean-Luc Béchennec, Mikaël Briday, Sébastien Faucou, Marc Herbstritt
2016 Worst-Case Execution Time Analysis  
We describe the implementation of Best, a tool for slicing binary code. We aim to integrate this tool in a WCET estimation framework based on model checking.  ...  In this approach, program slicing is used to abstract the program model in order to reduce the state space of the system.  ...  Implementation Architecture Our tool, Best for Binary Executable Slicing Tool, computes slices on binary executable files. Its architecture is illustrated in Figure 4 .  ... 
doi:10.4230/oasics.wcet.2016.7 dblp:conf/wcet/MangeanBBF16 fatcat:jak5mpflqnbz5dz6hlicos35nq

BEST: A symbolic testing tool for predicting multi-threaded program failures

Malay K. Ganai, Nipun Arora, Chao Wang, Aarti Gupta, Gogul Balakrishnan
2011 2011 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011)  
We present a tool BEST (Binary instrumentationbased Error-directed Symbolic Testing) for predicting concurrency violations. 1 We automatically infer potential concurrency violations such as atomicity violations  ...  from an observed run of a multi-threaded program, and use precise modeling and constraint-based symbolic (non-enumerative) search to find feasible violating schedules in a generalization of the observed  ...  To address the above mentioned issues, we propose a tool BEST (Binary instrumentation-based Error-directed Symbolic Testing) for predicting atomicity violation 2 in a generalization of an observed trace  ... 
doi:10.1109/ase.2011.6100134 dblp:conf/kbse/GanaiAWGB11 fatcat:cz5mnessjbagrbs2s5nqah6e5y

Best-Choice Topology: An Optimized Array-based Maximum Finder

Marina Prvan, Julije Ožegovic, Ivan Soco, Duje Coko
2019 International Journal of Advanced Computer Science and Applications  
In this paper, we concentrate on array-based topologies only, since our goal is to propose a new maximum-finder design called Best-Choice Topology (BCT), which is an optimized version of the standard Array  ...  Extracting maximum from an unsorted set of binary elements is important in many signal processing applications.  ...  As a first step, a parallel execution of n circuits with k slices produce n codewords which represent bitwise comparisons.  ... 
doi:10.14569/ijacsa.2019.0101203 fatcat:pgud2my44jhbdfawf52fr44e3a

Best practices in data analysis and sharing in neuroimaging using MRI

Thomas E Nichols, Samir Das, Simon B Eickhoff, Alan C Evans, Tristan Glatard, Michael Hanke, Nikolaus Kriegeskorte, Michael P Milham, Russell A Poldrack, Jean-Baptiste Poline, Erika Proal, Bertrand Thirion (+3 others)
2017 Nature Neuroscience  
For each of seven areas of a study we provide tabular listing of over 100 items to help plan, execute, report and share research in the most transparent fashion.  ...  To advance open science in neuroimaging the Organization for Human Brain Mapping created the Committee on Best Practice in Data Analysis and Sharing (COBIDAS), charged with creating a report that collects  ...  Behavioral Performance The successful execution of a task is essential for interpreting the cognitive effects of a task.  ... 
doi:10.1038/nn.4500 pmid:28230846 pmcid:PMC5685169 fatcat:76jlqlntrvfg7iz74anmuxreja

Best Practices in Data Analysis and Sharing in Neuroimaging using MRI [article]

Thomas E. Nichols, Samir Das, Simon B. Eickhoff, Alan C. Evans, Tristan Glatard, Michael Hanke, Nikolaus Kriegeskorte, Michael P. Milham, Russell A. Poldrack, Jean-Baptiste Poline, Erika Proal, Bertrand Thirion (+3 others)
2016 bioRxiv   pre-print
For each of seven areas of a study we provide tabular listing of over 100 items to help plan, execute, report and share research in the most transparent fashion.  ...  To advance open science in neuroimaging the Organization for Human Brain Mapping created the Committee on Best Practice in Data Analysis and Sharing (COBIDAS), charged with creating a report that collects  ...  Behavioral Performance The successful execution of a task is essential for interpreting the cognitive effects of a task.  ... 
doi:10.1101/054262 fatcat:2id2ebomabgkvnyxmvetk6z5be

CFSBFDroid: Android Malware Detection Using CFS + Best First Search-Based Feature Selection

Ravi Mohan Sharma, Chaitanya. P Agrawal, Vinod Kumar, Adugna Necho Mulatu, M. Praveen Kumar Reddy
2022 Mobile Information Systems  
To detect malicious applications installed on Android smartphones, we have conducted a study that focuses on permissions and intent-based mechanisms.  ...  With the fast development of smartphone technology and mobile applications, the mobile phone has become the most powerful tool to access the Internet and get various services with one click.  ...  In another form [22] , Gajrani et al. have presented a hybrid analysis approach EspyDroid + that incorporates a reflection-guided static slicing (RGSS) method, which helps handle C&C-controlled execution  ... 
doi:10.1155/2022/6425583 fatcat:ntuvcniibjhyzmoxtkahnkh2ba

Learning Convex Partitions and Computing Game-theoretic Equilibria from Best Response Queries [article]

Paul W. Goldberg, Francisco J. Marmolejo-Cossío
2019 arXiv   pre-print
We present two algorithms for this task: Constant-Dimension Generalised Binary Search (CD-GBS), which for constant m uses poly(n, ( 1/ϵ)) queries, and Constant-Region Generalised Binary Search (CR-GBS)  ...  the players has a constant number of pure strategies.  ...  For this reason, query complexity has been extensively used as a tool to differentiate hardness of equilibrium concepts in games.  ... 
arXiv:1807.06170v2 fatcat:bw2mcquqqnfilaefxigxkxjm6i

Best Practices in Accelerating the Data Science Process in Python [chapter]

Deanne Larson
2019 Open Source Programming for Data Science and Machine Learning [Working Title]  
This paper addresses the data science and big data project process, the gaps in the process, best practices, and how these best practices are being applied in Python, one of the common data science open-source  ...  Much has been researched on how data science algorithm is used and the benefits of big data, but very little has been written about what best practices can be leveraged to accelerate and effectively deliver  ...  Binarization is used to convert a numerical feature vector into a binary vector such as true or false.  ... 
doi:10.5772/intechopen.84784 fatcat:f5mtsb434rbytd36xrefyutcjy

Formalizing best practice for energy system optimization modelling

Joseph DeCarolis, Hannah Daly, Paul Dodds, Ilkka Keppo, Francis Li, Will McDowall, Steve Pye, Neil Strachan, Evelina Trutnevyte, Will Usher, Matthew Winning, Sonia Yeh (+1 others)
2017 Applied Energy  
As development time and experience grows with a particular model, there is a 106 tendency to use the same tool to address different problems, even when it may not be the 107 best option.  ...  Computer 36 models represent a critical tool that can be used to examine the future decision space under a 37 variety of different assumptions.  ...  First, the modeled relationship between installed capacity and investment cost is non-linear and therefore binary variables are needed to implement ETL within a linear optimization model.  ... 
doi:10.1016/j.apenergy.2017.03.001 fatcat:thdotjcvzrax7mobil2hhpjzey

Tai-e: A Static Analysis Framework for Java by Harnessing the Best Designs of Classics [article]

Tian Tan, Yue Li
2022 arXiv   pre-print
arguably the best one, but if none is good enough, we then propose a better design.  ...  in a way that analysis developers could benefit more: for example, what a good IR (for analysis) ought to look like?  ...  As an example, Figure 1 depicts how a binary statement (e.g., 𝑥 = 𝑦 + 𝑧), as a parameter of processBinary, is processed in different frameworks.  ... 
arXiv:2208.00337v1 fatcat:jur5yojcnrhlnagde33krfzzve

Video Forgery Detection Method based on Local Difference Binary

Guzin Ulutas, Beste Ustubioglu, Mustafa Ulutas, Vasif Nabiyev
2020 Pamukkale University Journal of Engineering Sciences  
In this study, a new frame duplication detection method using Local Difference Binary (LDB) is proposed to extract features from the frames.  ...  Execution time and low detection accuracy are the two main drawbacks of forgery detection methods reported in the literature.  ...  Local difference binary Yang et al. introduced a new binary descriptor called LDB in 2014 [18] .  ... 
doi:10.5505/pajes.2020.75768 fatcat:hhgdl7erfbcidghtdqm7dysqhq

Granular best match algorithm for context-aware computing systems

A. Baki Kocaballı, Altan Koçyiğit
2007 Journal of Systems and Software  
[83] introduced a geographical ontology enables measuring similarity of the spatial references on a fine scale than just binary decision mismatch.  ...  Schmidt [12] used six categories indexed by time slices to define context dimensions. The model is depicted in Figure 2 .  ... 
doi:10.1016/j.jss.2007.03.006 fatcat:m2vwiuzbbjg53a24xk6fyajdoy

Static Analysis for AWS Best Practices in Python Code [article]

Rajdeep Mukherjee, Omer Tripp, Ben Liblit, Michael Wilson
2022 arXiv   pre-print
In support of our best-practices goal, we present a layered strategy for type inference that combines multiple type-resolution and tracking strategies in a staged manner.  ...  Additionally, we present a representative sample of eight AWS best-practice rules that detect a wide range of issues including pagination, polling, and batch operations.  ...  For example, a definition edge from a binary multiplication action to a data node d indicates that d holds the result of that multiplication.  ... 
arXiv:2205.04432v1 fatcat:mebtqe6dzng6zhgshpgtuozsgi

The parallel system for integrating impact models and sectors (pSIMS)

Joshua Elliott, David Kelly, James Chryssanthacopoulos, Michael Glotter, Kanika Jhunjhnuwala, Neil Best, Michael Wilde, Ian Foster
2014 Environmental Modelling & Software  
This framework comprises a) tools for ingesting large amounts of data from various sources and standardizing them to a versatile and compact data type; b) tools for translating this standard data type  ...  small local clusters to supercomputers and even distributed grids and clouds; d) tools and data standards for reformatting outputs for easy analysis and visualization; and d) a methodology and tools for  ...  The black line is the best-fit linear model with R 2 = 0.60 at county and 0.73 at state level. Figure 7 : 7 Typical Swift configuration for pSIMS execution.  ... 
doi:10.1016/j.envsoft.2014.04.008 fatcat:ljy3mcl3djhwxfiruued6udzve

Best practices for the 3D documentation of the Grotta dei Cervi of Porto Badisco, Italy

J. A. Beraldin, M. Picard, A. Bandiera, V. Valzano, F. Negro, J. Angelo Beraldin, Geraldine S. Cheok, Michael B. McCarthy, Ulrich Neuschaefer-Rube, Atilla M. Baskurt, Ian E. McDowall, Margaret Dolinsky
2011 Three-Dimensional Imaging, Interaction, and Measurement  
a set of best practice guidelines in order to deliver the intended results.  ...  We now review some initiatives regarding best practices for 3D with a focus on cultural heritage.  ...  This subcommittee defines a best practice as a process or method that, when executed effectively, leads to enhanced project performance.  ... 
doi:10.1117/12.871211 dblp:conf/3dica/BeraldinPBVN11 fatcat:j3mhwcayqjgdtpocqsehstgmgy
« Previous Showing results 1 — 15 out of 20,852 results