Sciweavers

481 search results - page 88 / 97
» Differential symbolic execution
Sort
View
108
Voted
SIGSOFT
2007
ACM
16 years 1 months ago
Mining specifications of malicious behavior
Malware detectors require a specification of malicious behavior. Typically, these specifications are manually constructed by investigating known malware. We present an automatic t...
Mihai Christodorescu, Somesh Jha, Christopher Krue...
113
Voted
CHES
2004
Springer
216views Cryptology» more  CHES 2004»
15 years 4 months ago
Efficient Countermeasures against RPA, DPA, and SPA
In the execution on a smart card, side channel attacks such as simple power analysis (SPA) and the differential power analysis (DPA) have become serious threat [15]. Side channel a...
Hideyo Mamiya, Atsuko Miyaji, Hiroaki Morimoto
113
Voted
BPM
2006
Springer
113views Business» more  BPM 2006»
15 years 4 months ago
Process Equivalence: Comparing Two Process Models Based on Observed Behavior
In various application domains there is a desire to compare process models, e.g., to relate an organization-specific process model to a reference model, to find a web service match...
Wil M. P. van der Aalst, Ana Karla A. de Medeiros,...
90
Voted
DKE
2008
88views more  DKE 2008»
15 years 14 days ago
Quantifying process equivalence based on observed behavior
In various application domains there is a desire to compare process models, e.g., to relate an organization-specific process model to a reference model, to find a web service matc...
Ana Karla Alves de Medeiros, Wil M. P. van der Aal...
ISCI
2007
84views more  ISCI 2007»
15 years 9 days ago
Simulating continuous fuzzy systems
: In our book to appear in print from Springer-Verlag GmbH, Simulating Continuous Fuzzy Systems, Buckley and Jowers, we use crisp continuous simulation under Matlab™/Simulink™ ...
Leonard J. Jowers, James J. Buckley, Kevin D. Reil...