Sciweavers

14244 search results - page 2468 / 2849
» Modeling Program Predictability
Sort
View
RAID
2010
Springer
15 years 2 months ago
Bait Your Hook: A Novel Detection Technique for Keyloggers
Software keyloggers are a fast growing class of malware often used to harvest confidential information. One of the main reasons for this rapid growth is the possibility for unpriv...
Stefano Ortolani, Cristiano Giuffrida, Bruno Crisp...
ANOR
2010
139views more  ANOR 2010»
15 years 2 months ago
Some operations research methods for analyzing protein sequences and structures
Operations Research is probably one of the most successful fields of applied mathematics used in Economics, Physics, Chemistry, almost everywhere onehastoanalyzehugeamountsofdata.L...
Piotr Lukasiak, Jacek Blazewicz, Maciej Milostan
CLOUDCOM
2010
Springer
15 years 1 months ago
Applying Twister to Scientific Applications
Many scientific applications suffer from the lack of a unified approach to support the management and efficient processing of large-scale data. The Twister MapReduce Framework, whi...
Bingjing Zhang, Yang Ruan, Tak-Lon Wu, Judy Qiu, A...
LPAR
2010
Springer
15 years 1 months ago
Interpolating Quantifier-Free Presburger Arithmetic
Craig interpolation has become a key ingredient in many symbolic model checkers, serving as an approximative replacement for expensive quantifier elimination. In this paper, we foc...
Daniel Kroening, Jérôme Leroux, Phili...
UTP
2010
15 years 1 months ago
Unifying Theories of Confidentiality
Abstract. This paper presents a framework for reasoning about the security of confidential data within software systems. A novelty is that we use Hoare and He's Unifying Theor...
Michael J. Banks, Jeremy L. Jacob
« Prev « First page 2468 / 2849 Last » Next »