Sciweavers

1791 search results - page 135 / 359
» Behavioral Operations
Sort
View
CLEIEJ
2002
192views more  CLEIEJ 2002»
15 years 4 months ago
Automatic ObjectPascal Code Generation from Catalysis Specifications
This paper presents a Component-based Framework Development Process, of the Cardiology Domain. The Framework, called FrameCardio, was developed in 4 steps: 1Problem Domain Definit...
João Luís Cardoso de Moraes, Ant&oci...
CCS
2007
ACM
15 years 10 months ago
Panorama: capturing system-wide information flow for malware detection and analysis
Malicious programs spy on users’ behavior and compromise their privacy. Even software from reputable vendors, such as Google Desktop and Sony DRM media player, may perform undes...
Heng Yin, Dawn Xiaodong Song, Manuel Egele, Christ...
ISI
2004
Springer
15 years 10 months ago
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
Through their misuse of authorized privileges, insiders have caused great damage and loss to corporate internal information assets, especially within the Intelligence Community (IC...
Joon S. Park, Shuyuan Mary Ho
GI
2009
Springer
15 years 2 months ago
An Improved Method for creating Shared Belief in Communication Constrained Sensor Networks
: Networked systems that gather sensor data in order to react to phenomena in their surroundings are faced with a growing need for adaptive behavior to operate in dynamically chang...
Eelke van Foeken, Peter Hiemstra, Leon Kester
IISWC
2006
IEEE
15 years 10 months ago
Modeling Cache Sharing on Chip Multiprocessor Architectures
— As CMPs are emerging as the dominant architecture for a wide range of platforms (from embedded systems and game consoles, to PCs, and to servers) the need to manage on-chip res...
Pavlos Petoumenos, Georgios Keramidas, Håkan...