Sciweavers

5227 search results - page 240 / 1046
» Enterprise modeling using class and instance models
Sort
View
ACSAC
2006
IEEE
15 years 11 months ago
PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware
Modern malware often hide the malicious portion of their program code by making it appear as data at compiletime and transforming it back into executable code at runtime. This obf...
Paul Royal, Mitch Halpin, David Dagon, Robert Edmo...
CIKM
2009
Springer
15 years 8 months ago
Answer typing for information retrieval
Answer typing is commonly thought of as finding appropriate responses to given questions. We extend the notion of answer typing to information retrieval to ensure results contain...
Christopher Pinchak, Davood Rafiei, Dekang Lin
IPCO
2008
163views Optimization» more  IPCO 2008»
15 years 7 months ago
The Air Traffic Flow Management Problem: An Integer Optimization Approach
In this paper, we present a new Integer Program (IP) for the Air Traffic Flow Management (ATFM) problem. The model we propose provides a complete representation of all the phases o...
Dimitris Bertsimas, Guglielmo Lulli, Amedeo R. Odo...
IANDC
2007
151views more  IANDC 2007»
15 years 5 months ago
Transducer-based analysis of cryptographic protocols
Cryptographic protocols can be divided into (1) protocols where the protocol steps are simple from a computational point of view and can thus be modeled by simple means, for insta...
Ralf Küsters, Thomas Wilke
GECON
2009
Springer
96views Business» more  GECON 2009»
15 years 8 months ago
A QoS-Based Selection Mechanism Exploiting Business Relationships in Workflows
This paper deals with the problem of selecting service instances to execute workflow processes by not only taking into consideration Quality of Service (QoS) constraints, posed by ...
Dimosthenis Kyriazis, Konstantinos Tserpes, Ioanni...