Sciweavers

1231 search results - page 209 / 247
» A Model Transformation Approach for Design Pattern Evolution...
Sort
View
ACSAC
2007
IEEE
15 years 3 months ago
Limits of Static Analysis for Malware Detection
Malicious code is an increasingly important problem that threatens the security of computer systems. The traditional line of defense against malware is composed of malware detecto...
Andreas Moser, Christopher Kruegel, Engin Kirda
BXML
2003
14 years 11 months ago
Rule-Based Generation of XML Schemas from UML Class Diagrams
We present an approach of how to automatically extract an XML document structure from a conceptual data model that describes the content of the document. We use UML class diagrams ...
Tobias Krumbein, Thomas Kudrass
WWW
2007
ACM
15 years 10 months ago
Altering document term vectors for classification: ontologies as expectations of co-occurrence
In this paper we extend the state-of-the-art in utilizing background knowledge for supervised classification by exploiting the semantic relationships between terms explicated in O...
Meenakshi Nagarajan, Amit P. Sheth, Marcos Kawazoe...
ADC
2005
Springer
104views Database» more  ADC 2005»
15 years 3 months ago
Dynamic Restructuring of Recovery Nets
A Self-Adaptive Recovery Net (SARN) is an extended Petri net model for specifying exceptional behavior in workflow systems. SARN caters for high-level recovery policies that are ...
Rachid Hamadi, Boualem Benatallah
ICOIN
2003
Springer
15 years 2 months ago
Information-Theoretic Bounds for Mobile Ad-hoc Networks Routing Protocols
Abstract. In this paper, we define the routing overhead as the amount of information needed to describe the changes in a network topology. We derive a universal lower bound on the...
Nianjun Zhou, Alhussein A. Abouzeid