Sciweavers

817 search results - page 80 / 164
» Malware behaviour analysis
Sort
View
CSCW
2008
ACM
15 years 1 months ago
Social networks and context-aware spam
Social networks are popular for online communities. This paper evaluates the risk of sophisticated context-aware spam that could result from information sharing on social networks...
Garrett Brown, Travis Howe, Micheal Ihbe, Atul Pra...
ECMDAFA
2009
Springer
170views Hardware» more  ECMDAFA 2009»
15 years 6 months ago
A Model Driven Approach to the Analysis of Timeliness Properties
The need for a design language that is rigorous but accessible and intuitive is often at odds with the formal and mathematical nature of languages used for analysis. UML and Petri ...
Mohamed Ariff Ameedeen, Behzad Bordbar, Rachid Ana...
IJCAI
1989
15 years 1 months ago
Perturbation Analysis with Qualitative Models
Perturbation analysis deals with the relation­ ships between small changes in a system's inputs or model and changes in its outputs. Reverse simulation is of particular inte...
Renato de Mori, Robert Prager
ESEC
1997
Springer
15 years 4 months ago
Verification of Liveness Properties Using Compositional Reachability Analysis
The software architecture of a distributed program can be represented by a hierarchical composition of subsystems, with interacting processes at the leaves of the hierarchy. Compo...
Shing-Chi Cheung, Dimitra Giannakopoulou, Jeff Kra...
ICFP
2006
ACM
15 years 12 months ago
Towards an automatic complexity analysis for generic programs
Generic libraries, such as the C++ Standard Template Library (STL), provide flexible, high-performance algorithms and data types, along with functional specifications and performa...
Kyle D. Ross