中国科学院机构知识库网格
Chinese Academy of Sciences Institutional Repositories Grid
首页
机构
成果
学者
登录
注册
登陆
×
验证码:
换一张
忘记密码?
记住我
×
校外用户登录
CAS IR Grid
机构
软件研究所 [6]
采集方式
OAI收割 [6]
内容类型
会议论文 [4]
期刊论文 [2]
发表日期
2014 [1]
2013 [1]
2012 [1]
2011 [2]
2009 [1]
学科主题
Computer S... [1]
筛选
浏览/检索结果:
共6条,第1-6条
帮助
限定条件
专题:软件研究所
第一署名单位
第一作者单位
通讯作者单位
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
提交时间升序
提交时间降序
发表日期升序
发表日期降序
题名升序
题名降序
作者升序
作者降序
Understanding the tradeoffs between software-managed vs. hardware-managed caches in GPUs
会议论文
OAI收割
2014 IEEE International Symposium on Performance Analysis of Systems and Software, ISPASS 2014, Monterey, CA, United states, March 23, 2014 - March 25, 2014
Li, Chao (1)
;
Yang, Yi (2)
;
Dai, Hongwen (1)
;
Yan, Shengen (3)
;
Mueller, Frank (4)
;
Zhou, Huiyang (1)
  |  
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2014/12/16
Heuristic path pruning algorithm based on error handling pattern recognition in detecting vulnerability
会议论文
OAI收割
2013 IEEE 37th Annual Computer Software and Applications Conference Workshops, COMPSACW 2013, Kyoto, Japan, July 22, 2013 - July 26, 2013
Chen, Dong (1)
;
Zhang, Yang (1)
;
Cheng, Liang (1)
;
Deng, Yi (1)
;
Sun, Xiaoshan (1)
  |  
收藏
  |  
浏览/下载:27/0
  |  
提交时间:2014/12/16
symbolic execution
path pruning
error handling
binary code
vulnerability detection
a multi-cycle checkpointing protocol that ensures strict 1-rollback
期刊论文
OAI收割
Information Processing Letters, 2012, 卷号: 112, 期号: 20, 页码: 788-793
Ci Yi-Wei
;
Zhang Zhan
;
Zuo De-Cheng
;
Wu Zhi-Bo
;
Yang Xiao-Zong
  |  
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2012/11/12
non-linear beam tracing on a gpu
期刊论文
OAI收割
COMPUTER GRAPHICS FORUM, 2011, 卷号: 30, 期号: 8, 页码: 2156-2169
Liu Baoquan
;
Wei Li-Yi
;
Yang Xu
;
Ma Chongyang
;
Xu Ying-Qing
;
Guo Baining
;
Wu Enhua
  |  
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2013/10/08
nonlinear beam tracing
real-time rendering
GPU techniques
reflection
refraction
depsim: a dependency-based malware similarity comparison system
会议论文
OAI收割
6th China International Conference on Information Security and Cryptology, Inscrypt 2010, Shanghai, China, 20-Oct
Yi Yang
;
Lingyun Ying
;
Rui Wang
;
Purui Su
;
Dengguo Feng
  |  
收藏
  |  
浏览/下载:20/0
  |  
提交时间:2011/10/10
Behavioral research
Computer crime
Cryptography
Dynamic analysis
Network security
Program processors
Semantics
reconbin: reconstructing binary file from execution for software analysis
会议论文
OAI收割
3rd International Conference on Secure Software Integration and Reliability Improvement, Shanghai, PEOPLES R CHINA, JUL 08-10,
Ying Lingyun
;
Su Purui
;
Feng Dengguo
;
Wang Xianggen
;
Yang Yi
;
Liu Yu
  |  
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2011/03/20
execution monitoring
software security
analysis
malware analysis
binary analysis