Sciweavers

817 search results - page 46 / 164
» Malware behaviour analysis
Sort
View
TCS
2008
14 years 11 months ago
Using bisimulation proof techniques for the analysis of distributed abstract machines
Analysis of Distributed Abstract Machines Damien Pous ENS Lyon, France. We illustrate the use of recently developed proof techniques for weak bisimulation sing a generic framework...
Damien Pous
SIMPRA
2008
137views more  SIMPRA 2008»
14 years 11 months ago
An admissible-behaviour-based analysis of the deadlock in Petri-net controllers
This paper addresses the problem of verifying the discrete control logic that is typically implemented by programmable controllers. Not only are the logical properties of the cont...
G. Music, Drago Matko
INTERSPEECH
2010
14 years 6 months ago
Glottal-based analysis of the lombard effect
The Lombard effect refers to the speech changes due to the immersion of the speaker in a noisy environment. Among these changes, studies have already reported acoustic modificatio...
Thomas Drugman, Thierry Dutoit
EDOC
2000
IEEE
15 years 4 months ago
Model Checking of Workflow Schemas
Practical experience indicates that the definition of realworld workflow applications is a complex and error-prone process. Existing workflow management systems provide the means,...
Christos T. Karamanolis, Dimitra Giannakopoulou, J...
CN
1998
118views more  CN 1998»
14 years 11 months ago
Predicting Network Traffic for Collaborative Virtual Environments
We introduce a method for predicting the network traffic that will be generated by Collaborative Virtual Environment applications with varying numbers of participants. Statistical...
Chris Greenhalgh, Steve Benford, Adrian Bullock, N...