Filters








34,899 Hits in 3.6 sec

Automatic Simplification of Obfuscated JavaScript Code (Extended Abstract) [chapter]

Gen Lu, Kevin Coogan, Saumya Debray
2012 Communications in Computer and Information Science  
Experiments using a prototype implementation indicate that our approach is able to penetrate multiple layers of complex obfuscations and extract the core logic of the computation.  ...  This paper describes a simple approach to deobfuscation of JavaScript code based on dynamic analysis and slicing.  ...  Construct a control flow graph from this trace to determine the structure of the code that is executed. 3.  ... 
doi:10.1007/978-3-642-29166-1_31 fatcat:fimzy6ojxjgnlkympd7oy652ue

Behavioural Clustering by Extensive Declarative Specifications Measurements (Extended Abstract)

Alessio Cecconi
2020 International Conference on Process Mining  
A declarative specification allows for complex relations among activities regardless of their distance in the execution flow.  ...  Indeed, a declarative rule describes a desired property of the process, not a specific execution.  ... 
dblp:conf/icpm/Cecconi20 fatcat:4hflwirtivb3fejyu4xb6bitzm

Extending Automatic Parallelization to Optimize High-Level Abstractions for Multicore [chapter]

Chunhua Liao, Daniel J. Quinlan, Jeremiah J. Willcock, Thomas Panas
2009 Lecture Notes in Computer Science  
Our work extends the applicability of automatic parallelization to modern applications using high-level abstractions and exposes more opportunities to take advantage of multicore processors.  ...  Several representative parallelization candidate kernels are used to explore semantic-aware parallelization strategies for high-level abstractions, combined with extended compiler analyses.  ...  The ROSE IR includes an abstract syntax tree (AST), symbol tables, a control flow graph, etc. and is based loosely on the Sage++ IR design [9] .  ... 
doi:10.1007/978-3-642-02303-3_3 fatcat:tddm42kq7rhbjhze2i7kpj6wfi

Lost in Abstraction: Monotonicity in Multi-Threaded Programs (Extended Technical Report) [article]

Alexander Kaiser, Daniel Kroening, Thomas Wahl
2014 arXiv   pre-print
We demonstrate how the abstract programs can be modified into monotone ones, without affecting safety properties of the non-monotone abstraction.  ...  In this paper, we show that the act of obtaining finite-data thread abstractions for model checking can be at odds with monotonicity: Predicate-abstracting certain widely used monotone software results  ...  Recent work on data flow graph representations of fixed-thread concurrent programs has been applied to safety property verification [14] .  ... 
arXiv:1406.5715v2 fatcat:necrlavcqvhujblmquutt5x3dq

Extending Abstract Acceleration Methods to Data-Flow Programs with Numerical Inputs

Peter Schrammel, Bertrand Jeannet
2010 Electronical Notes in Theoretical Computer Science  
In this article we address the latter problem by extending the concept of abstract acceleration of Gonnord et al. to numerical input variables.  ...  Lustre programs, firstly requires the enumeration of the Boolean states in order to obtain a control graph with numerical variables only.  ...  program; (4) f is the vector of transition functions.  ... 
doi:10.1016/j.entcs.2010.09.009 fatcat:phcmohh65zafphafhedvsokelq

Annotation Inference for Safety Certification of Automatically Generated Code (Extended Abstract)

Ewen Denney, Bernd Fischer
2006 21st IEEE/ACM International Conference on Automated Software Engineering (ASE'06)  
Abstracted Control Flow Graphs. The algorithm uses abstracted control flow graphs (CFGs), in which code fragments matching specific patterns are collapsed into individual nodes.  ...  For each variable, it builds an abstracted control flow graph where irrelevant parts of the program are collapsed into single nodes.  ... 
doi:10.1109/ase.2006.15 dblp:conf/kbse/DenneyF06 fatcat:ral5rwc5wfhobpimx47zz4uevq

Variability Abstractions: Trading Precision for Speed in Family-Based Analyses (Extended Version) [article]

Aleksandar S. Dimovski, Claus Brabrand, Andrzej Wąsowski
2015 arXiv   pre-print
Family-based (lifted) data-flow analysis for Software Product Lines (SPLs) is capable of analyzing all valid products (variants) without generating any of them explicitly.  ...  abstracted analysis of the original SPL.  ...  We extend the operator˙ to operate over tuples of functions: f˙ g = ∀x.f (x)˙ g(x).  ... 
arXiv:1503.04608v1 fatcat:xi5wlke3tvg4tk4yqtdg65c364

On Formal Methods for Collective Adaptive System Engineering. Scalable Approximated, Spatial Analysis Techniques. Extended Abstract

Diego Latella
2016 Electronic Proceedings in Theoretical Computer Science  
In this extended abstract a view on the role of Formal Methods in System Engineering is briefly presented.  ...  Both techniques have been developed in the context of the EU funded project QUANTICOL.  ...  (their location in) space during their own execution.  ... 
doi:10.4204/eptcs.217.7 fatcat:fhd24qs7zfa3zitukvh7ppgyne

Extending the Abstraction of Personality Types based on MBTI with Machine Learning and Natural Language Processing [article]

Carlos Basto
2021 arXiv   pre-print
In addition, the study demonstrated a broad spectrum for the evolution and deepening of the task and possible approaches for a greater extension of the abstraction of personality types.  ...  The results showed that attention to the data iteration loop focused on quality, explanatory power and representativeness for the abstraction of more relevant/important resources for the studied phenomenon  ...  The entire flow for the features abstraction was established to support y' justifications for success, containing details of sentimental, grammatical and aspects analysis as well as the union of all for  ... 
arXiv:2105.11798v1 fatcat:c4gubf4crbe5xb4sxl7vjrexsu

Innovation and Global Issues 1: Extended Abstracts Book [article]

Nurettin Bilici, Ragıp Pehlivanlı, Selçuk Demirkılınç
2021 figshare.com  
It is a valuable academic work that contains extended abstracts of the academic studies presented within the scope of Innovation and Global Issues Congress I in Patara Antique city by InGlobe Academy and  ...  who are studying Pedagogical Formation in Faculty of Education on attitude and motivation of self-efficacy.  ...  Lightning and It is an inventory consisting of Likert type 17 questions, finalized by İlhan (2010). Self-efficacy skill inventory; It is composed of sub-dimensions of initiation,  ... 
doi:10.6084/m9.figshare.13634555.v3 fatcat:nlekic2mu5cmze3ad5dn6jorzq

Innovation and Global Issues 1: Extended Abstracts Book [article]

Nurettin Bilici, Ragıp Pehlivanlı, Selçuk Demirkılınç
2021 figshare.com  
Faculty of Education and teacher candidates who are studying Pedagogical Formation in Faculty of Education on attitude and motivation of self-efficacy.  ...  Lightning and It is an inventory consisting of Likert type 17 questions, finalized by İlhan (2010). Self-efficacy skill inventory; It is composed of sub-dimensions of initiation,  ...  Bulgular ve Sonuç Extended Abstract The emergence of realism as an aesthetic concept occurred in France in the mid-19th century.  ... 
doi:10.6084/m9.figshare.13634555.v1 fatcat:q5mkgjq3jrh5jn4ualb2pshj5u

Leveraging intersections in management theory and practice (Extended Abstracts)

MARTA UGOLINI
2021 Sinergie Italian Journal of Management  
Balancing theory and practice: a review of the state of PLS-SEM research by the community of Italian management scholars FRANCESCA MAGNO, FABIO CASSIA " Co-creation of value in Open Innovation: does coopetition  ...  The role of Big Data in the business challenge of Covid-19: a systematic literature review in managerial studies MICHELA PICCAROZZI, BARBARA AQUILANI " Exploring digital transition strategies for the "  ...  KOUFARIS M. (2002), "Applying the Technology Acceptance Model and Flow Theory to Online Consumer Behavior", Information System Research, vol. 13, n. 2, pp. 205-223.  ... 
doi:10.7433/srecp.ea.2021.01 fatcat:l2upsdqpqvc3zgahty45hquici

Information-theoretic Sensorimotor Foundations of Fitts' Law

Dari Trendafilov, Daniel Polani
2019 Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems - CHI '19  
We present the formalism in a Fitts' law type goal-directed arm movement task and suggest that empowerment is one potential underlying determinant of movement trajectory planning in the presence of signal-dependent  ...  Empowerment captures uncertainty in the perception-action loop of different nature (e.g. noise, delays, etc.) in a single quantity.  ...  executing actions u.  ... 
doi:10.1145/3290607.3313053 dblp:conf/chi/TrendafilovP19 fatcat:jqgw4kuearg3biagtgurhxno64

Lowering the barrier to applying machine learning

Kayur Patel
2010 Proceedings of the 28th of the international conference extended abstracts on Human factors in computing systems - CHI EA '10  
I found that the key barrier to adoption is not a poor understanding of the machine learning algorithms themselves, but rather a poor understanding of the process for applying those algorithms and insufficient  ...  Lowering the Barrier to Applying Machine Learning Data is driving the future of computation: analysis, visualization, and learning algorithms power systems that help us diagnose cancer, live sustainably  ...  Because the computational flow is explicitly represented as a graph, programmers can use graph analysis algorithms to find independent components and execute those components in parallel for improved performance  ... 
doi:10.1145/1753846.1753882 dblp:conf/chi/Patel10 fatcat:ctphoo6owzfnpf53ihq7kjix3e

Towards Text Search for Information Visualization Retrieval

Romain Vuillemot, Mehmet Akmanalp
2015 Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems - CHI EA '15  
We investigate the use of text search to retrieve information visualizations. This is important as the body of available visualizations on the web is growing.  ...  Results from an exploratory study informed us on the types of tasks to support and on the visual design of the search box, such as showing recommendations similar to Google results.  ...  Elasticsearch's built-in ranking uses a mixture of TF-IDF and the vector space model that tends to work well for our needs.  ... 
doi:10.1145/2702613.2732753 dblp:conf/chi/VuillemotA15 fatcat:ubezd7q63fdnpod2dgycf55cia
« Previous Showing results 1 — 15 out of 34,899 results