Sciweavers

3056 search results - page 591 / 612
» Compiling Embedded Languages
Sort
View
CCS
1999
ACM
15 years 6 months ago
A High-Performance Network Intrusion Detection System
In this paper we present a new approach for network intrusion detection based on concise specifications that characterize normal and abnormal network packet sequences. Our speci...
R. Sekar, Y. Guang, S. Verma, T. Shanbhag
ESEC
1999
Springer
15 years 6 months ago
Yesterday, My Program Worked. Today, It Does Not. Why?
Imagine some program and a number of changes. If none of these changes is applied (“yesterday”), the program works. If all changes are applied (“today”), the program does n...
Andreas Zeller
CODES
2007
IEEE
15 years 6 months ago
Influence of procedure cloning on WCET prediction
For the worst-case execution time (WCET) analysis, especially loops are an inherent source of unpredictability and loss of precision. This is caused by the difficulty to obtain sa...
Paul Lokuciejewski, Heiko Falk, Martin Schwarzer, ...
DILS
2009
Springer
15 years 6 months ago
A Visual Interface for on-the-fly Biological Database Integration and Workflow Design Using VizBuilder
Abstract. Data integration plays a major role in modern Life Sciences research primarily because required resources are geographically distributed across continents and experts dep...
Shahriyar Hossain, Hasan M. Jamil
ACSC
2004
IEEE
15 years 6 months ago
Java Implementation Verification Using Reverse Engineering
An approach to system verification is described in which design artefacts produced during forward engineering are automatically compared to corresponding artefacts produced during...
David J. A. Cooper, Benjamin Khoo, Brian R. von Ko...