Sciweavers

4307 search results - page 382 / 862
» Dynamic Spyware Analysis
Sort
View
101
Voted
ISSTA
2006
ACM
15 years 10 months ago
A model and sensitivity analysis of the quality economics of defect-detection techniques
One of the main cost factors in software development is the detection and removal of defects. However, the relationships and influencing factors of the costs and revenues of defe...
Stefan Wagner
COMPLIFE
2005
Springer
15 years 9 months ago
Robust Perron Cluster Analysis for Various Applications in Computational Life Science
In the present paper we explain the basic ideas of Robust Perron Cluster Analysis (PCCA+) and exemplify the different application areas of this new and powerful method. Recently, ...
Marcus Weber, Susanna Kube
FORMATS
2003
Springer
15 years 9 months ago
Performance Analysis of Probabilistic Timed Automata Using Digital Clocks
Probabilistic timed automata, a variant of timed automata extended with discrete probability distributions, is a specification formalism suitable for describing both nondeterminis...
Marta Z. Kwiatkowska, Gethin Norman, David Parker,...
ICNP
2002
IEEE
15 years 9 months ago
Analysis of the MED Oscillation Problem in BGP
The Multi Exit Discriminator (MED) attribute of the Border Gateway Protocol (BGP) is widely used to implement “cold potato routing” between autonomous systems. However, the us...
Timothy Griffin, Gordon T. Wilfong
COLCOM
2009
IEEE
15 years 9 months ago
Towards automatic privacy management in Web 2.0 with semantic analysis on annotations
— Sharing personal information and documents is pervasive in Web 2.0 environments, which creates the need for properly controlling shared data. Most existing authorization and po...
Nitya Vyas, Anna Cinzia Squicciarini, Chih-Cheng C...