Sciweavers

219 search results - page 30 / 44
» Context-aware counter abstraction
Sort
View
COMPSEC
2008
113views more  COMPSEC 2008»
14 years 12 months ago
Automated containment of rootkits attacks
Abstract-- Rootkit attacks are a serious threat to computer systems. Packaged with other malware such as worms, viruses and spyware, rootkits pose a more potent threat than ever be...
Arati Baliga, Liviu Iftode, Xiaoxin Chen
TAP
2008
Springer
153views Hardware» more  TAP 2008»
14 years 11 months ago
Bounded Relational Analysis of Free Data Types
Abstract. In this paper we report on our first experiences using the relational analysis provided by the Alloy tool with the theorem prover KIV in the context of specifications of ...
Andriy Dunets, Gerhard Schellhorn, Wolfgang Reif
TCS
2008
14 years 11 months ago
Verification of qualitative Z constraints
We introduce an LTL-like logic with atomic formulae built over a constraint language interpreting variables in Z. The constraint language includes periodicity constraints, comparis...
Stéphane Demri, Régis Gascon
MICCAI
2010
Springer
14 years 10 months ago
Appearance Normalization of Histology Slides
Abstract. This paper presents a method for automatic color and intensity normalization of digitized histology slides stained with two different agents. In comparison to previous a...
Marc Niethammer, David Borland, J. S. Marron, John...
INFOCOM
2011
IEEE
14 years 3 months ago
Modeling residual-geometric flow sampling
Abstract—Traffic monitoring and estimation of flow parameters in high speed routers have recently become challenging as the Internet grew in both scale and complexity. In this ...
Xiaoming Wang, Xiaoyong Li, Dmitri Loguinov