Sciweavers

112 search results - page 13 / 23
» Information Flow Analysis of Android Applications in DroidSa...
Sort
View
DBSEC
2009
124views Database» more  DBSEC 2009»
15 years 1 months ago
Towards System Integrity Protection with Graph-Based Policy Analysis
Abstract. Identifying and protecting the trusted computing base (TCB) of a system is an important task, which is typically performed by designing and enforcing a system security po...
Wenjuan Xu, Xinwen Zhang, Gail-Joon Ahn
VIZSEC
2004
Springer
15 years 5 months ago
Email archive analysis through graphical visualization
The analysis of the vast storehouse of email content accumulated or produced by individual users has received relatively little attention other than for specific tasks such as spa...
Wei-Jen Li, Shlomo Hershkop, Salvatore J. Stolfo
ZUM
2000
Springer
101views Formal Methods» more  ZUM 2000»
15 years 3 months ago
Analysis of Compiled Code: A Prototype Formal Model
Abstract. This paper reports on an experimental application of formal specification to inform analysis of compiled code. The analyses with are concerned attempt to recover abstract...
R. D. Arthan
111
Voted
BMCBI
2005
124views more  BMCBI 2005»
15 years 5 days ago
Tools enabling the elucidation of molecular pathways active in human disease: Application to Hepatitis C virus infection
Background: The extraction of biological knowledge from genome-scale data sets requires its analysis in the context of additional biological information. The importance of integra...
David J. Reiss, Iliana Avila-Campillo, Vesteinn Th...
VL
2009
IEEE
118views Visual Languages» more  VL 2009»
15 years 7 months ago
What designers want: Needs of interactive application designers
Designers’ extensive software needs have not been adequately documented in the research literature, and are poorly supported by software. Without appropriate tools to support th...
Valentina Grigoreanu, Roland Fernandez, Kori Inkpe...