Sciweavers

2468 search results - page 348 / 494
» On Model Checking Techniques for Randomized Distributed Syst...
Sort
View
163
Voted
SP
2010
IEEE
194views Security Privacy» more  SP 2010»
15 years 7 months ago
Identifying Dormant Functionality in Malware Programs
—To handle the growing flood of malware, security vendors and analysts rely on tools that automatically identify and analyze malicious code. Current systems for automated malwar...
Paolo Milani Comparetti, Guido Salvaneschi, Engin ...
EMSOFT
2011
Springer
14 years 3 months ago
Model-checking behavioral programs
System specifications are often structured as collections of scenarios and use-cases that describe desired and forbidden sequences of events. A recently proposed behavioral progr...
David Harel, Robby Lampert, Assaf Marron, Gera Wei...
159
Voted
MIDDLEWARE
2004
Springer
15 years 9 months ago
The Peer Sampling Service: Experimental Evaluation of Unstructured Gossip-Based Implementations
In recent years, the gossip-based communication model in large-scale distributed systems has become a general paradigm with important applications which include information dissemi...
Márk Jelasity, Rachid Guerraoui, Anne-Marie...
153
Voted
TPDS
2008
196views more  TPDS 2008»
15 years 3 months ago
End-to-End Energy Management in Networked Real-Time Embedded Systems
Recent technological advances have opened up a wide range of distributed real-time applications involving battery-driven embedded devices with local processing and wireless communi...
G. Sudha Anil Kumar, Govindarasu Manimaran, Zhengd...
CVPR
2009
IEEE
16 years 11 months ago
An Empirical Bayes Approach to Contextual Region Classification
This paper presents a nonparametric approach to labeling of local image regions that is inspired by recent developments in information-theoretic denoising. The chief novelty of ...
Svetlana Lazebnik (UNC Chapel Hill), Maxim Raginsk...