Essays about: "Binary Code"

Showing result 1 - 5 of 71 essays containing the words Binary Code.

  1. 1. Neural Networks for Predictive Maintenance on Highly Imbalanced Industrial Data

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Oscar Montilla Tabares; [2023]
    Keywords : Class Imbalance; Cost Sensitivity; Cost-Sensitive Learning; Focal Loss; Binary Classification; Machine Learning; Deep Learning;

    Abstract : Preventive maintenance plays a vital role in optimizing industrial operations. However, detecting equipment needing such maintenance using available data can be particularly challenging due to the class imbalance prevalent in real-world applications. READ MORE

  2. 2. Decompiling Go : Using metadata to improve decompilation readability

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Mattias Grenfeldt; [2023]
    Keywords : Decompilation; Go; Runtime Metadata; Reverse Engineering; Dekompilering; Go; Körtidsmetadata; Reverse Engineering;

    Abstract : Malware written in Go is on the rise, and yet, tools for investigating Go programs, such as decompilers, are limited. A decompiler takes a compiled binary and tries to recover its source code. Go is a high-level language that requires runtime metadata to implement many of its features, such as garbage collection and polymorphism. READ MORE

  3. 3. Intermediate-mass black hole binary as an origin of super-massive black holes

    University essay from Lunds universitet/Astrofysik; Lunds universitet/Fysiska institutionen

    Author : Isabelle Signe Maj Maria Thord; [2023]
    Keywords : Intermediate-mass black holes; binary; merger; hardening; encounters; Physics and Astronomy;

    Abstract : Galactic nuclei contain super-massive black holes (SMBHs), nuclear stellar clusters (NSCs), or both. In the NSC, intermediate-mass black holes (IMBHs) are likely to reside and form highly eccentric binaries. Over time, the orbit of a binary could harden via interaction with surrounding low-mass stars. READ MORE

  4. 4. Exposing memory accesses and branches in machine code to symbolic execution : Tracking instructions through binary raising

    University essay from Linköpings universitet/Programvara och system

    Author : Isak Axelsson; [2023]
    Keywords : Binary lifting; Binary raising; Spectre;

    Abstract : In 2018, a new security vulnerability was discovered that existed in billions of processors from different manufacturers, using various architectures. A so-called spectre attack can be launched to exploit the vulnerability and cause cryptographic information to leak through side-channels of the targeted system. READ MORE

  5. 5. Performance Evaluation of Digital Image Processing on the Web using WebAssembly

    University essay from Uppsala universitet/Avdelningen för beräkningsvetenskap

    Author : Christoffer Nyberg; [2023]
    Keywords : WebAssembly; wasm; SIMD; multithreading; performance;

    Abstract : JavaScript has been the de-facto standard programming language for Web browsers for some time. Although it has enabled the interactive and complex web pages we have today, it has long been characterized by performance issues. A promising new technology, WebAssembly, aims to enable near-native performance on the Web. READ MORE