Sciweavers

36 search results - page 7 / 8
» Binary fuzzy goal programming
Sort
View
ACSAC
2007
IEEE
14 years 17 days ago
Limits of Static Analysis for Malware Detection
Malicious code is an increasingly important problem that threatens the security of computer systems. The traditional line of defense against malware is composed of malware detecto...
Andreas Moser, Christopher Kruegel, Engin Kirda
ICPP
2006
IEEE
14 years 7 days ago
A Flexible and Dynamic Infrastructure for MPI Tool Interoperability
The MPI standard provides tool builders with an efficient profiling interface, PMPI. Although many tools have successfully used this interface, it has three major drawbacks: a n...
Martin Schulz, Bronis R. de Supinski
SRDS
2006
IEEE
14 years 6 days ago
Reliably Executing Tasks in the Presence of Untrusted Entities
In this work we consider a distributed system formed by a master processor and a collection of n processors (workers) that can execute tasks; worker processors are untrusted and m...
Antonio Fernández, Luis López, Agust...
ECAI
2008
Springer
13 years 8 months ago
Heuristics for Dynamically Adapting Propagation
Building adaptive constraint solvers is a major challenge in constraint programming. An important line of research towards this goal is concerned with ways to dynamically adapt th...
Kostas Stergiou
NDSS
2007
IEEE
14 years 15 days ago
Generic Application-Level Protocol Analyzer and its Language
Application-level protocol analyzers are important components in tools such as intrusion detection systems, firewalls, and network monitors. Currently, protocol analyzers are wri...
Nikita Borisov, David Brumley, Helen J. Wang, John...