Sciweavers

481 search results - page 88 / 97
» Differential symbolic execution
Sort
View
SIGSOFT
2007
ACM
15 years 11 months ago
Mining specifications of malicious behavior
Malware detectors require a specification of malicious behavior. Typically, these specifications are manually constructed by investigating known malware. We present an automatic t...
Mihai Christodorescu, Somesh Jha, Christopher Krue...
CHES
2004
Springer
216views Cryptology» more  CHES 2004»
15 years 1 months ago
Efficient Countermeasures against RPA, DPA, and SPA
In the execution on a smart card, side channel attacks such as simple power analysis (SPA) and the differential power analysis (DPA) have become serious threat [15]. Side channel a...
Hideyo Mamiya, Atsuko Miyaji, Hiroaki Morimoto
BPM
2006
Springer
113views Business» more  BPM 2006»
15 years 1 months ago
Process Equivalence: Comparing Two Process Models Based on Observed Behavior
In various application domains there is a desire to compare process models, e.g., to relate an organization-specific process model to a reference model, to find a web service match...
Wil M. P. van der Aalst, Ana Karla A. de Medeiros,...
DKE
2008
88views more  DKE 2008»
14 years 10 months ago
Quantifying process equivalence based on observed behavior
In various application domains there is a desire to compare process models, e.g., to relate an organization-specific process model to a reference model, to find a web service matc...
Ana Karla Alves de Medeiros, Wil M. P. van der Aal...
ISCI
2007
84views more  ISCI 2007»
14 years 10 months ago
Simulating continuous fuzzy systems
: In our book to appear in print from Springer-Verlag GmbH, Simulating Continuous Fuzzy Systems, Buckley and Jowers, we use crisp continuous simulation under Matlab™/Simulink™ ...
Leonard J. Jowers, James J. Buckley, Kevin D. Reil...