Sciweavers

3013 search results - page 514 / 603
» Context-Oriented Domain Analysis
Sort
View
SP
2010
IEEE
140views Security Privacy» more  SP 2010»
15 years 4 months ago
Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries
Abstract—Unfortunately, malicious software is still an unsolved problem and a major threat on the Internet. An important component in the fight against malicious software is the...
Clemens Kolbitsch, Thorsten Holz, Christopher Krue...
144
Voted
DAWAK
2009
Springer
15 years 4 months ago
Visual Modelling of Data Warehousing Flows with UML Profiles
Data warehousing involves complex processes that transform source data through several stages to deliver suitable information ready to be analysed. Though many techniques for visua...
Jesús Pardillo, Matteo Golfarelli, Stefano ...
EUROMICRO
2009
IEEE
15 years 4 months ago
Formal Semantics of the ProCom Real-Time Component Model
ProCom is a new component model for real-time and embedded systems, targeting the domains of vehicular and telecommunication systems. In this paper, we describe how the architectur...
Aneta Vulgarakis, Jagadish Suryadevara, Jan Carlso...
108
Voted
APNOMS
2006
Springer
15 years 4 months ago
Improved Handoff Performance Based on Pre-binding Update in HMIPv6
Abstract. In this paper, an efficient neighbor AR (Access Router) discovery scheme and handoff procedure using neighbor information are proposed. It allows each AR and Mobility Anc...
Jongpil Jeong, Min Young Chung, Hyunseung Choo
COMPSAC
2004
IEEE
15 years 4 months ago
Efficient Partial Multiple Periodic Patterns Mining without Redundant Rules
Partial periodic patterns mining is a very interesting domain in data mining problem. In the previous studies, full and partial multiple periodic patterns mining problems are cons...
Wenpo Yang, Guanling Lee