Sciweavers

2662 search results - page 390 / 533
» Objects-early tools: a demonstration
Sort
View
ISPASS
2008
IEEE
15 years 4 months ago
Configurational Workload Characterization
Although the best processor design for executing a specific workload does depend on the characteristics of the workload, it can not be determined without factoring-in the effect o...
Hashem Hashemi Najaf-abadi, Eric Rotenberg
ACSAC
2007
IEEE
15 years 4 months ago
Toward Realistic and Artifact-Free Insider-Threat Data
Progress in insider-threat detection is currently limited by a lack of realistic, publicly available, real-world data. For reasons of privacy and confidentiality, no one wants to...
Kevin S. Killourhy, Roy A. Maxion
IV
2007
IEEE
152views Visualization» more  IV 2007»
15 years 4 months ago
Geovisualization and synergies from InfoVis and Visual Analytics
Geovisualization (GeoViz) is an intrinsically complex process. The analyst needs to look at data from various perspectives and at various scales, from “seeing the whole” to ...
Gennady L. Andrienko, Mikael Jern, Jason Dykes, Sa...
SP
2007
IEEE
135views Security Privacy» more  SP 2007»
15 years 4 months ago
Exploring Multiple Execution Paths for Malware Analysis
Malicious code (or malware) is defined as software that fulfills the deliberately harmful intent of an attacker. Malware analysis is the process of determining the behavior and ...
Andreas Moser, Christopher Krügel, Engin Kird...
96
Voted
VALUETOOLS
2006
ACM
164views Hardware» more  VALUETOOLS 2006»
15 years 4 months ago
Analysis of Markov reward models using zero-suppressed multi-terminal BDDs
High-level stochastic description methods such as stochastic Petri nets, stochastic UML statecharts etc., together with specifications of performance variables (PVs), enable a co...
Kai Lampka, Markus Siegle