Sciweavers

4340 search results - page 728 / 868
» Formal Methods and Cryptography
Sort
View
WER
2007
Springer
15 years 11 months ago
Evolving Use Case Maps as a Scenario and Workflow Description Language
Since 1996, the core Use Case Map (UCM) notation has remained remarkably stable. As the structure and intent of workflow and scenario languages are very similar, UCMs have been ap...
Gunter Mussbacher
ACSAC
2006
IEEE
15 years 11 months ago
PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware
Modern malware often hide the malicious portion of their program code by making it appear as data at compiletime and transforming it back into executable code at runtime. This obf...
Paul Royal, Mitch Halpin, David Dagon, Robert Edmo...
CBMS
2006
IEEE
15 years 11 months ago
An Ontology-Driven Mediator for Querying Time-Oriented Biomedical Data
— Most biomedical research databases contain considerable amounts of time-oriented data. However, temporal knowledge about the contextual meaning of such data is not usually repr...
Martin J. O'Connor, Ravi Shankar, Amar K. Das
ICSEA
2006
IEEE
15 years 11 months ago
Testing a Network by Inferring Representative State Machines from Network Traces
— This paper describes an innovative approach to network testing based on automatically generating and analyzing state machine models of network behavior. The models are generate...
Nancy D. Griffeth, Yuri Cantor, Constantinos Djouv...
MEMOCODE
2006
IEEE
15 years 11 months ago
Specifying and proving properties of timed I/O automata in the TIOA toolkit
Timed I/O Automata (TIOA) is a mathematical framework for modeling and verification of distributed systems that involve discrete and continuous dynamics. TIOA can be used for exa...
Myla Archer, Hongping Lim, Nancy A. Lynch, Sayan M...