咨询与建议

限定检索结果

文献类型

  • 8 篇 会议
  • 4 篇 期刊文献

馆藏范围

  • 12 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 12 篇 工学
    • 11 篇 计算机科学与技术...
    • 7 篇 软件工程
    • 4 篇 信息与通信工程
    • 3 篇 电气工程

主题

  • 12 篇 program customiz...
  • 2 篇 protocol dialect...
  • 2 篇 deep learning
  • 2 篇 memory managemen...
  • 2 篇 software analysi...
  • 2 篇 binary rewriting
  • 2 篇 authentication
  • 2 篇 machine learning
  • 2 篇 binary analysis
  • 2 篇 profile-based op...
  • 2 篇 dynamic storage ...
  • 1 篇 feature-oriented...
  • 1 篇 performance
  • 1 篇 dynamic linking
  • 1 篇 embedded operati...
  • 1 篇 generics
  • 1 篇 java runtime env...
  • 1 篇 deployment
  • 1 篇 debugging and te...
  • 1 篇 java

机构

  • 4 篇 george washingto...
  • 1 篇 penn state univ ...
  • 1 篇 division of comp...
  • 1 篇 univ lille 1 irc...
  • 1 篇 microsoft corp r...
  • 1 篇 univ colorado de...
  • 1 篇 george washingto...
  • 1 篇 intelligent auto...
  • 1 篇 otto von guerick...
  • 1 篇 department of co...

作者

  • 5 篇 lan tian
  • 5 篇 venkataramani gu...
  • 4 篇 chen yurong
  • 2 篇 xue hongfa
  • 1 篇 grunwald d
  • 1 篇 wu dinghao
  • 1 篇 jin guang
  • 1 篇 olsson ra
  • 1 篇 ho ww
  • 1 篇 apel sven
  • 1 篇 leich thomas
  • 1 篇 jiang yufei
  • 1 篇 seidl ml
  • 1 篇 grimaud gilles
  • 1 篇 gogineni kailash
  • 1 篇 kuhlemann martin
  • 1 篇 zorn bg
  • 1 篇 courbot alexandr...
  • 1 篇 li jason
  • 1 篇 sun shaowen

语言

  • 12 篇 英文
检索条件"主题词=program customization"
12 条 记 录,以下是1-10 订阅
排序:
JRed: program customization and Bloatware Mitigation Based on Static Analysis  40
JRed: Program Customization and Bloatware Mitigation Based o...
收藏 引用
40th Annual IEEE Computer Software and Applications Conference Symposium (COMPSAC) / Symposium on Software Engineering Technology and Applications (SETA)
作者: Jiang, Yufei Wu, Dinghao Liu, Peng Penn State Univ University Pk PA 16802 USA
Modern software engineering practice increasingly brings redundant code into software products, which has caused a phenomenon called bloatware, leading to software system maintenance, performance and reliability issue... 详细信息
来源: 评论
Generic feature modules: Two-staged program customization
Generic feature modules: Two-staged program customization
收藏 引用
1st International Conference on Software and Data Technologies
作者: Apel, Sven Kuhlemann, Martin Leich, Thomas Otto Von Guericke Univ Magdeburg Germany
With feature-oriented programming (FOP) and generics programmers have proper means for structuring software so that its elements can be reused and extended. This paper addresses the issue whether both approaches are e... 详细信息
来源: 评论
Hecate: Automated customization of program and Communication Features to Reduce Attack Surfaces  15th
Hecate: Automated Customization of Program and Communication...
收藏 引用
15th EAI International Conference on Security and Privacy in Communication Networks (SecureComm)
作者: Xue, Hongfa Chen, Yurong Venkataramani, Guru Lan, Tian George Washington Univ Washington DC 20052 USA
Customizing program and communication features is a commonly adopted strategy to counter security threats that arise from rapid inflation of software features. In this paper, we propose Hecate, a novel framework that ... 详细信息
来源: 评论
Implementing heap-object behavior prediction efficiently and effectively
收藏 引用
SOFTWARE-PRACTICE & EXPERIENCE 2001年 第9期31卷 869-892页
作者: Seidl, ML Zorn, BG Univ Colorado Dept Comp Sci Boulder CO 80309 USA Microsoft Corp Redmond WA 98052 USA
Heap-allocated objects play an important role in many modern programs. Various results have shown the overall performance of these programs can be improved by increasing the reference locality of heap-allocated object... 详细信息
来源: 评论
AN APPROACH TO GENUINE DYNAMIC LINKING
收藏 引用
SOFTWARE-PRACTICE & EXPERIENCE 1991年 第4期21卷 375-390页
作者: HO, WW OLSSON, RA Division of Computer Science University of California Davis CA 95616 U.S.A.
This paper describes a new approach to dynamic link/unlink editing. The basis of this approach is a library of link editing functions that can add compiled object code to or remove such code from a process any time du... 详细信息
来源: 评论
CUSTOMALLOC - EFFICIENT SYNTHESIZED MEMORY ALLOCATORS
收藏 引用
SOFTWARE-PRACTICE & EXPERIENCE 1993年 第8期23卷 851-869页
作者: GRUNWALD, D ZORN, B Department of Computer Science Campus Box 430 University of Colorado Boulder 80309-0430 U.S.A.
The allocation and disposal of memory is a ubiquitous operation in most programs. Rarely do programmers concern themselves with details of memory allocators;most assume that memory allocators provided by the system pe... 详细信息
来源: 评论
CustomPro: Network Protocol customization Through Cross-Host Feature Analysis  15th
CustomPro: Network Protocol Customization Through Cross-Host...
收藏 引用
15th EAI International Conference on Security and Privacy in Communication Networks (SecureComm)
作者: Chen, Yurong Lan, Tian Venkataramani, Guru George Washington Univ Washington DC 20052 USA
The implementations of network protocols are often "bloated" due to various users' needs and complex environment for deployment. The continual expansion of program features contribute to not only growing... 详细信息
来源: 评论
Verify-Pro: A Framework for Server Authentication using Communication Protocol Dialects
Verify-Pro: A Framework for Server Authentication using Comm...
收藏 引用
IEEE Military Communications Conference (MILCOM)
作者: Gogineni, Kailash Mei, Yongsheng Venkataramani, Guru Lan, Tian George Washington Univ Dept Elect & Comp Engn Washington DC 20052 USA
Customizing program binary and communication features is a commonly adopted strategy to counter network security threats like session hijacking, context confusion, and impersonation attacks. A potential attacker may h... 详细信息
来源: 评论
TOSS: Tailoring Online Server Systems through Binary Feature customization  25
TOSS: Tailoring Online Server Systems through Binary Feature...
收藏 引用
Workshop on Forming an Ecosystem Around Software Transformation (FEAST)
作者: Chen, Yurong Sun, Shaowen Lan, Tian Venkataramani, Guru George Washington Univ Washington DC 20052 USA
Network-based models are increasingly adopted to deliver key software service and utilities (e.g., data storage, search, and processing) to end users. The need to satisfy diverse user requirements and to fit different... 详细信息
来源: 评论
Verify-Pro: A Framework for Server Authentication using Communication Protocol Dialects
Verify-Pro: A Framework for Server Authentication using Comm...
收藏 引用
IEEE Military Communications Conference (MILCOM)
Customizing program binary and communication features is a commonly adopted strategy to counter network security threats like session hijacking, context confusion, and impersonation attacks. A potential attacker may h... 详细信息
来源: 评论