Sciweavers

817 search results - page 94 / 164
» Malware behaviour analysis
Sort
View
JCSS
2011
154views more  JCSS 2011»
14 years 6 months ago
Model interoperability via Model Driven Development
It is widely recognised that software development is a complex process. Among the factors that contribute to its inherent complexity is the gap between the design and the formal a...
Mohamed Ariff Ameedeen, Behzad Bordbar, Rachid Ana...
CAISE
2001
Springer
15 years 4 months ago
Relaxed Soundness of Business Processes
Business processes play a central role in the reorganization of a company and the (re)design of the respective information system(s). Typically the processes are described with the...
Juliane Dehnert, Peter Rittgen
100
Voted
PLDI
2011
ACM
14 years 2 months ago
Understanding POWER multiprocessors
Exploiting today’s multiprocessors requires highperformance and correct concurrent systems code (optimising compilers, language runtimes, OS kernels, etc.), which in turn requir...
Susmit Sarkar, Peter Sewell, Jade Alglave, Luc Mar...
IFIP
2009
Springer
15 years 6 months ago
Static Detection of Logic Flaws in Service-Oriented Applications
Application or business logic, used in the development of services, has to do with the operations that define the application functionalities and not with the platform ones. Often...
Chiara Bodei, Linda Brodo, Roberto Bruni
IAT
2008
IEEE
15 years 6 months ago
An Agent Model for a Human's Functional State and Performance
This paper presents an agent model of the dynamics of a human’s functional state in relation to task performance and environment. It can be used in agent systems that support hu...
Tibor Bosse, Fiemke Both, Rianne van Lambalgen, Ja...