Sciweavers

1061 search results - page 139 / 213
» A general definition of malware
Sort
View
CISC
2005
Springer
116views Cryptology» more  CISC 2005»
15 years 5 months ago
Specifying Authentication Using Signal Events in CSP
The formal analysis of cryptographic protocols has developed into a comprehensive body of knowledge, building on a wide variety of formalisms and treating a diverse range of securi...
Siraj A. Shaikh, Vicky J. Bush, Steve A. Schneider
EMSOFT
2005
Springer
15 years 5 months ago
A unified HW/SW interface model to remove discontinuities between HW and SW design
One major challenge in System-on-Chip (SoC) design is the definition and design of interfaces between hardware and software. Traditional ASIC designer and software designer model ...
Aimen Bouchhima, Xi Chen, Frédéric P...
MUM
2004
ACM
154views Multimedia» more  MUM 2004»
15 years 5 months ago
Plug-and-play application platform: towards mobile peer-to-peer
While peer-to-peer (P2P) has emerged as a new hot communication concept among the Internet users, mobile usage of P2P applications is still taking its first steps. This article fi...
Erkki Harjula, Mika Ylianttila, Jussi Ala-Kurikka,...
WOSS
2004
ACM
15 years 5 months ago
Towards a knowledge-based approach to architectural adaptation management
Self-adaptive software continually evaluates and modifies its own behavior to meet changing demands. One of the key issues in constructing such software is that of planning when a...
John C. Georgas, Richard N. Taylor
EVOW
2004
Springer
15 years 5 months ago
Two-Step Genetic Programming for Optimization of RNA Common-Structure
We present an algorithm for identifying putative non-coding RNA (ncRNA) using an RCSG (RNA Common-Structural Grammar) and show the effectiveness of the algorithm. The algorithm con...
Jin-Wu Nam, Je-Gun Joung, Y. S. Ahn, Byoung-Tak Zh...