As the Internet of Things (IoT) becomes a part of our daily life, there is a rapid growth in the connected devices. A well-established approach based on cloud computing technologies cannot provide the necessary qualit...
详细信息
Numeric truncation is a widely spread error in software written in languages with static data typing, such as C/C++ or Java. It occurs when the significant bits of the value with a bigger type size are truncated durin...
详细信息
Decompilation is reconstruction of a program in a high-level language from a program in a low-level language. In most cases static decompilation is unable to completely reconstruct high-level data types due to loss of...
详细信息
Decompilation is reconstruction of a program in a high-level language from a program in a low-level language. In most cases static decompilation is unable to completely reconstruct high-level data types due to loss of typing information during compilation. We present several profile-based techniques that help to recover high-level types. The techniques include pointer/integer determination by value profiling and composite type identification by heap profiling.
Bottom-up segmentation approaches, where words are combined into lines, lines into paragraphs, etc., are well-known nowadays. In this work, we use this principle for classification of segments. The features of the blo...
详细信息
ISBN:
(数字)9798331504663
ISBN:
(纸本)9798331504670
Bottom-up segmentation approaches, where words are combined into lines, lines into paragraphs, etc., are well-known nowadays. In this work, we use this principle for classification of segments. The features of the blocks that make up a segment and their relationships can be sufficient for classification. Our approach combines a specific choice of features that increases explainability by employing the generalizing ability of neural networks. This work presents an intermediate result, but, nevertheless, the 0.793 classification accuracy on the part of PubLayNet indicates the competitive potential of the approach. It is expected that, similar to the transition from MLP to CNN for MNIST, the transition from vector representation at our stage to GCN at the planned stage will allow us to achieve good results in document classification.
Taint analysis mainly detects data leaks and unsafe use of untrusted data obtained from external sources. It reports dataflow paths connecting taint sources and taint sinks in the analyzed program. This paper focuses ...
Taint analysis mainly detects data leaks and unsafe use of untrusted data obtained from external sources. It reports dataflow paths connecting taint sources and taint sinks in the analyzed program. This paper focuses on inter-modular aspect of project analysis: large projects may contain dozens or even hundreds of target executable files to be analyzed. If analyzed separately, scalability problem arises due to high percentage of reused source files. Here we discuss the idea of linking these bitcode files together to form a single project-wide bitcode file and some caveats of this method: e.g. it makes possible to have execution paths visiting functions' definitions which never appear in the same target file. We also propose a method of eliminating such paths for IFDS-based analyzers. The methods were implemented in static taint analyzer Irbis and evaluated on several real projects with hundreds of thousands lines of code.
Social networks crawling is in the focus of active research the last years. One of the challenging task is to collect target nodes in an initially unknown graph given a budget of crawling steps. Predicting a node prop...
详细信息
Building upon existing software systems while maintaining or improving software quality is a major goal of software engineering. To achieve this, every software engineering phase (requirements analysis, software desig...
详细信息
Building upon existing software systems while maintaining or improving software quality is a major goal of software engineering. To achieve this, every software engineering phase (requirements analysis, software design, implementation, testing and maintenance) must produce good quality outputs for the next phase. We believe that a next generation reverse engineering tool can assist in realizing this need. InSight is a new and powerful CASE toolset for software developers and architects, designed to support the development and maintenance of software throughout the complete lifecycle. The inSight tool suite provides software architects and developers with new capabilities of understanding existing software systems, allowing them to ask their day-to-day questions directly to the tool and receive up-to-date answers while interacting with the tool. It includes data mining capabilities such as code flow extraction, and software interaction extraction such as operating system and application specific messaging, uses, needs, etc. The inSight tool suite also includes powerful graphical interfaces for presenting and manipulating the extracted information. Control flow is presented as editable flowcharts. InSight supports Protel, ANSI C, and C++. InSight uses a patent pending reverse engineering technique to perform these extractions.
Rendering of large scenes in external memory is one of the most important problems of computer graphics, which is used in such areas as CAD/CAM/CAE, geoinformatics, project management, scientific visualization, virtua...
详细信息
Creating an effective pump that is able to maintain blood circulation in a heart with appropriate medical indications is undoubtedly a crucial task. First versions of such devices are currently being created and teste...
详细信息
Creating an effective pump that is able to maintain blood circulation in a heart with appropriate medical indications is undoubtedly a crucial task. First versions of such devices are currently being created and tested on the basis of IFPM SB RAS, Novosibirsk. This work is devoted to a pump numerical simulations in order to optimize parameters. Equations of viscous incompressible fluid flow are used for this purpose. Implemented numerical algorithm is based on the regularization of the initial equations, which applies a finite volume method that avoids limiting procedures and includes them controlled numerical dissipation. Calculations are carried out within open software package OpenFOAM is installed at ISP RAS. Unsteady flow in the pump is studied.
A corridor sensitivity analysis was performed at Houston, TX, to help analyze the local placement of ITS technologies to improve the overall performance of current and future EPA emission models. There was a potential...
详细信息
ISBN:
(纸本)0923204806
A corridor sensitivity analysis was performed at Houston, TX, to help analyze the local placement of ITS technologies to improve the overall performance of current and future EPA emission models. There was a potential difference of > 20% depending on the base bin data, vehicle speed, and vehicle-miles traveled. As a result of these findings, a corridor sensitivity study was developed with real-time ITS data for one section of the I-10 corridor in San Antonio, TX. The impact of temporal aggregation associated with a nonrecurring incident was quantified. MOBILE6 emission rates were developed specifically for the San Antonio area. There was slight difference in vehicle emissions estimation between the two techniques for temporal aggregation between the 5 through 30 min aggregated bins. There was some difference in the emissions estimation between the 1-min and the 45 and 60 min aggregation levels. This is an abstract of a paper presented at the AWMA's 99th Annual Conference and Exhibition (New Orleans, LA 6/20-23/2006).
暂无评论