Sciweavers

1804 search results - page 205 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
RTCSA
1998
IEEE
15 years 9 months ago
Protocol Synthesis from Context-Free Processes Using Event Structures
In this paper, we propose a protocol synthesis method based on a partial order model (called event structures) for the class of context-free processes. First, we assign a unique n...
Akio Nakata, Teruo Higashino, Kenichi Taniguchi
ICISC
2007
99views Cryptology» more  ICISC 2007»
15 years 6 months ago
Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized VMM Using Split Kernel Module
VMM (virtual machine monitor) based system provides the useful inspection and interposition of guest OS. With proper modification of guest OS, we can obtain event-driven memory sn...
Ruo Ando, Youki Kadobayashi, Yoichi Shinoda
IEEEPACT
1998
IEEE
15 years 9 months ago
Dynamic Hammock Predication for Non-Predicated Instruction Set Architectures
Conventional speculative architectures use branch prediction to evaluate the most likely execution path during program execution. However, certain branches are difficult to predic...
Artur Klauser, Todd M. Austin, Dirk Grunwald, Brad...
ISCI
2011
14 years 11 months ago
A tool for design pattern detection and software architecture reconstruction
It is well known that software maintenance and evolution are expensive activities, both in terms of invested time and money. Reverse engineering activities support the obtainment ...
Francesca Arcelli Fontana, Marco Zanoni
130
Voted
SNPD
2008
15 years 6 months ago
Testing Component-Based Real Time Systems
This paper focuses on studying efficient solutions for modeling and deriving compositional tests for component-based real-time systems. In this work, we propose a coherent framewo...
Rachid Bouaziz, Ismail Berrada