Showing 161 - 180 results of 807 for search '"Control flow"', query time: 0.37s Refine Results
  1. 161

    Accelerating Irregular Applications with Pipeline Parallelism by Nguyen, Quan Minh

    Published 2022
    “…Irregular applications have frequent data-dependent memory accesses and control flow. They arise in many emerging and important domains, including sparse deep learning, graph analytics, and database processing. …”
    Get full text
    Thesis
  2. 162
  3. 163

    Data Delivery Implementation on River Flow Control System Prototype Using HTTP by Mochammad Hannats Hanafi Ichsan, Sabriansyah Rizqika Akbar, Hamdan Malik Satriyo Aji, Eko Setiawan, Othman Mirizi Batubara

    Published 2023-12-01
    “…In this research, the process of sending data from the sensor node (Control Flow System) to the master node (Control station) to the cloud server to be displayed on a website. …”
    Get full text
    Article
  4. 164

    Separated Control and Data Stacks to Mitigate Buffer Overflow Exploits by Christopher Kugler, Tilo Müller

    Published 2015-10-01
    “…By separating control information from the data stack, we can protect sensitive pointers of a program’s control flow from being overwritten by buffer overflows. …”
    Get full text
    Article
  5. 165

    Translating Workflow Nets to Process Trees: An Algorithmic Approach by Sebastiaan J. van Zelst, Sander J. J. Leemans

    Published 2020-11-01
    “…A process tree is a (mathematical) tree-based model of a process, in which internal vertices represent behavioral control-flow relations and leaves represent process activities. …”
    Get full text
    Article
  6. 166

    Execution Model Enforcement Via Program Shepherding by Kiriansky, Vladimir, Bruening, Derek, Amarasinghe, Saman

    Published 2023
    “…Program shepherding monitors control flow in order to enforce a security policy. …”
    Get full text
  7. 167

    Control Jujutsu by Evans, Isaac, Long, Fan, Otgonbaatar, Ulziibayar, Shrobe, Howard E, Rinard, Martin C, Okhravi, Hamed, Sidiroglou-Douskos, Stelios

    Published 2018
    “…Control flow integrity (CFI) has been proposed as an approach to defend against control-hijacking memory corruption attacks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 168
  9. 169

    Dependence flow graph for analysis of aspect-oriented programs by Ahmad, Syarbaini, Abd Ghani, Abdul Azim, Mohd Sani, Fazlida

    Published 2014
    “…In general, program analysis is performed either based on control flow graph or dependence graph. However, in the case of aspect-oriented programming (AOP), control flow graph (CFG) or dependence graph (DG) are not enough to model the properties of Aspect-oriented (AO) programs. …”
    Get full text
    Article
  10. 170
  11. 171

    Strcmp-like Function Identification Method Based on Data Flow Feature Matching by HU An-xiang, YIN Xiao-kang, ZHU Xiao-ya, LIU Sheng-li

    Published 2022-09-01
    “…Embedded devices have become visible everywhere,and they are used in a range of security-critical and privacy-sensitive applications.However,recent studies show that many embedded devices have backdoor,of which hard-coded backdoor(password backdoor) is the most common.In the triggering process of password backdoor,strcmp-like functions are necessary and important absolutely.However,the current identification of strcmp-like functions mainly relies on function signature and control flow feature matching.The former can't recognize user-defined strcmp-like functions,and the identify effect is greatly affected by the compile environment.The latter has high false positive rate and false negative rate.To solve the above problems,this paper proposes a novel strcmp-like recognition technology CMPSeek.This method builds a model for strcmp-like function identification based on the analysis of control flow and data flow characteristics,which is used to identify strcmp-like functions in binary programs,and is suitable for stripped binary programs.Furthermore,ARM,MIPS,PPC and x86/64 instruction sets are supported by converting binary codes to the intermediate language representation VEX IR codes.Experimental results show that CMPSeek has better results in accuracy rate and recall rate than FLIRT and SaTC in the absence of source code,function name and other information.…”
    Get full text
    Article
  12. 172

    Ryazan Universities Networking Cooperation: The Theory and Experience of the Organization by Natalya A. Kopylova

    Published 2019-07-01
    “…The existing results are given in the article. The control-flow chart of the subprogram – client work and the control-flow chart of the subprogram – server work are shown in pictures.…”
    Get full text
    Article
  13. 173

    Online incremental updating for model enhancement based on multi-perspective trusted intervals by Na Fang, Xianwen Fang, Ke Lu

    Published 2022-12-01
    “…First, analyse the reference model to construct multi-perspective trusted interval constraints in the offline stage. From a control-flow perspective, the behavioural relationships between activities are researched using a deep clustering approach. …”
    Get full text
    Article
  14. 174

    A framework for multi-perspective process mining into a BPMN process model by Merve Nur TİFTİK, Tugba GURGEN ERDOGAN, Ayça KOLUKISA TARHAN

    Published 2022-08-01
    “…When process mining is extended far beyond discovering the control-flow models to capture additional perspectives; roles, bottlenecks, amounts of time passed, guards, and routing probabilities in the process can be identified. …”
    Get full text
    Article
  15. 175
  16. 176

    Effectiveness analysis of Aspect-Oriented Dependence Flow Graph as an intermediate representation tool by Ahmad, Syarbaini, Abd Ghani, Abdul Azim

    Published 2018
    “…Graph-based representations of programs such as control flow graph or dependence graph have been used to support program analysis tasks such as program comprehension and software maintenance. …”
    Get full text
    Article
  17. 177

    BiN: A Two-Level Learning-Based Bug Search for Cross-Architecture Binary by Hao Wu, Hui Shu, Fei Kang, Xiaobing Xiong

    Published 2019-01-01
    “…At present, the solution to this problem mostly calculates code similarities by generating a CFG (control flow graph) from binary code, but due to the choice of architecture, OS (operating system) or compilation options, the same source code will be compiled into different assembly codes. …”
    Get full text
    Article
  18. 178

    Conceptual-level workflow modeling of scientific experiments using NMR as a case study by Gryk Michael R, Ellis Heidi JC, Verdi Kacy K

    Published 2007-01-01
    “…In addition, the models provide an accurate visual description of the control flow for conducting biomolecular analysis using NMR spectroscopy experiment.…”
    Get full text
    Article
  19. 179

    A tool for automatic verification of post-transaction input error handling by Ho, Mary Shih Leong.

    Published 2008
    “…This research project is to experiment on the proposed approach and to develop a prototype tool to transform the source codes for database transactions into control flow graphs so that the proposed approach can be applied to verify if the database transactions are correctable.…”
    Get full text
    Thesis
  20. 180

    RBF-MLMR: A Multi-Label Metamorphic Relation Prediction Approach Using RBF Neural Network by Pengcheng Zhang, Xuewu Zhou, Patrizio Pelliccione, Hareton Leung

    Published 2017-01-01
    “…First, RBF-MLMR uses state-of-the-art soot analysis tool to generate control flow graph and corresponds labels from the source codes of programs. …”
    Get full text
    Article