Sciweavers

1599 search results - page 306 / 320
» Program Analysis for Security and Privacy
Sort
View
IJWIN
2006
209views more  IJWIN 2006»
14 years 11 months ago
On Connected Multiple Point Coverage in Wireless Sensor Networks
Abstract-- We consider a wireless sensor network consisting of a set of sensors deployed randomly. A point in the monitored area is covered if it is within the sensing range of a s...
Shuhui Yang, Fei Dai, Mihaela Cardei, Jie Wu, Floy...
TASE
2008
IEEE
14 years 11 months ago
Perspectives in Probabilistic Verification
Soon after the birth of the flourishing research area of model checking in the early eighties, researchers started to apply this technique to finite automata equipped with probabi...
Joost-Pieter Katoen
JOT
2007
106views more  JOT 2007»
14 years 11 months ago
Extending eclipse RCP with dynamic update of active plug-ins
While the dynamic linking mechanism of modern programming languages, such as Java, allows loading of classes dynamically, it does not allow class reloading. Hence, dynamic linking...
Allan Raundahl Gregersen, Bo Nørregaard J&o...
ISW
2007
Springer
15 years 5 months ago
Detecting System Emulators
Malware analysis is the process of determining the behavior and purpose of a given malware sample (such as a virus, worm, or Trojan horse). This process is a necessary step to be a...
Thomas Raffetseder, Christopher Krügel, Engin...
OOPSLA
2007
Springer
15 years 5 months ago
OOMatch: pattern matching as dispatch in Java
We present a new language feature, specified as an extension to Java. The feature is a form of dispatch which includes and subsumes multimethods (see for example [3]), but which ...
Adam Richard, Ondrej Lhoták