Sciweavers

817 search results - page 57 / 164
» Malware behaviour analysis
Sort
View
WCET
2008
15 years 1 months ago
Towards Predicated WCET Analysis
In this paper, we propose the use of constraint logic programming as a way of modeling contextsensitive execution-times of program segments. The context-sensitive constraints are ...
Amine Marref, Guillem Bernat

Dataset
1353views
13 years 10 months ago
QMUL Junction Dataset
QMUL junction dataset is for research on activity analysis and crowded scenes. Video length: 1 hour (90000 frames) Frame size: 360x288 Frame rate: 25 Hz Compression codec: ff...
CADE
2007
Springer
16 years 4 days ago
Combining Deduction and Algebraic Constraints for Hybrid System Analysis
We show how theorem proving and methods for handling real algebraic constraints can be combined for hybrid system verification. In particular, we highlight the interaction of deduc...
André Platzer
IWCMC
2009
ACM
15 years 6 months ago
Carrier sense multiple access with enhanced collision avoidance: a performance analysis
Abstract—Carrier Sense Multiple Access with Enhanced Collision Avoidance (CSMA/ECA) is a recently proposed modification to the well-known CSMA/CA protocol. By using a determinis...
Jaume Barceló, Boris Bellalta, Cristina Can...
IPPS
2006
IEEE
15 years 5 months ago
Towards an analysis of race carrier conditions in real-time Java
The RTSJ memory model propose a mechanism based on a scope three containing all region-stacks in the system and a reference-counter collector. In order to avoid reference cycles a...
M. Teresa Higuera-Toledano