Sciweavers

817 search results - page 144 / 164
» Malware behaviour analysis
Sort
View
EMSOFT
2004
Springer
15 years 3 months ago
Defining and translating a "safe" subset of simulink/stateflow into lustre
The Simulink/Stateflow toolset is an integrated suite enabling model-based design and has become popular in the automotive and aeronautics industries. We have previously developed...
Norman Scaife, Christos Sofronis, Paul Caspi, Stav...
EUROMICRO
2004
IEEE
15 years 3 months ago
SaveCCM - A Component Model for Safety-Critical Real-Time Systems
Component-based development has proven effective in many engineering domains, and several general component technologies are available. Most of these are focused on providing an e...
Hans Hansson, Mikael Åkerholm, Ivica Crnkovi...
CLEF
2006
Springer
15 years 3 months ago
iCLEF 2006 Overview: Searching the Flickr WWW Photo-Sharing Repository
This paper summarizes the task design for iCLEF 2006 (the CLEF interactive track). Compared to previous years, we have proposed a radically new task: searching images in a natural...
Jussi Karlgren, Julio Gonzalo, Paul Clough
APLAS
2003
ACM
15 years 3 months ago
Resource Usage Verification
We investigate how to automatically verify that resources such as files are not used improperly or unsafely by a program. We employ a mixture of compile-time analysis and run-time ...
Kim Marriott, Peter J. Stuckey, Martin Sulzmann
92
Voted
COORDINATION
2009
Springer
15 years 3 months ago
From Coordination to Stochastic Models of QoS
Abstract. Reo is a channel-based coordination model whose operational semantics is given by Constraint Automata (CA). Quantitative Constraint Automata extend CA (and hence, Reo) wi...
Farhad Arbab, Tom Chothia, Rob van der Mei, Sun Me...