Sciweavers

817 search results - page 122 / 164
» Malware behaviour analysis
Sort
View
SAFECOMP
2004
Springer
15 years 5 months ago
How Explicit Are the Barriers to Failure in Safety Arguments?
Safety cases embody arguments that demonstrate how safety properties of a system are upheld. Such cases implicitly document the barriers that must exist between hazards and vulnera...
Shamus P. Smith, Michael D. Harrison, Bastiaan A. ...
TOOLS
1999
IEEE
15 years 4 months ago
Associations as a Language Construct
stone in the object-oriented paradigm is the abstraction mechanisms transcending analysis, design, and implementation. The notions of class, object, behaviour, and inheritance are...
Kasper Østerbye
LREC
2010
144views Education» more  LREC 2010»
15 years 1 months ago
Towards an Improved Methodology for Automated Readability Prediction
Since the first half of the 20th century, readability formulas have been widely employed to automatically predict the readability of an unseen text. In this article, the formulas ...
Philip van Oosten, Dries Tanghe, Véronique ...
FMOODS
2003
15 years 1 months ago
Design and Verification of Distributed Multi-media Systems
Performance analysis of computing systems, in particular distributed computing systems, is a complex process. Analysing the complex flows and interactions between a set of distribu...
David H. Akehurst, John Derrick, A. Gill Waters
ACTA
2000
92views more  ACTA 2000»
14 years 11 months ago
How to Calculate Symmetries of Petri Nets
Symmetric net structure yields symmetric net behaviour. Thus, knowing the symmetries of a net, redundant calculations can be skipped. We present a framework for the calculation of ...
Karsten Schmidt 0004