Modern malware often hide the malicious portion of their program code by making it appear as data at compiletime and transforming it back into executable code at runtime. This obf...
Paul Royal, Mitch Halpin, David Dagon, Robert Edmo...
In this paper, we introduce the combinatorial auction model for resource management in grids. We propose a combinatorial auction-based resource allocation protocol in which a user...
This paper introduces S.P.L.O.T., a Web-based reasoning and configuration system for Software Product Lines (SPLs). The system benefits from mature logic-based reasoning techniq...
Abstract. Continuous optimization of business process execution including its adaptation to changes within the market environment or the company itself becomes increasingly importa...
Mathias Fritzsche, Jendrik Johannes, Sebastian Cec...
Background: Very often genome-wide data analysis requires the interoperation of multiple databases and analytic tools. A large number of genome databases and bioinformatics applic...
Remko de Knikker, Youjun Guo, Jin-long Li, Albert ...