Sciweavers

1426 search results - page 166 / 286
» Specification of nonmonotonic reasoning
Sort
View
WETICE
1999
IEEE
15 years 2 months ago
Static Analysis of Binary Code to Isolate Malicious Behaviors
In this paper, we address the problem of static slicing on binary executables for the purposes of the malicious code detection in COTS components. By operating directly on binary ...
J. Bergeron, Mourad Debbabi, M. M. Erhioui, B&eacu...
RE
1999
Springer
15 years 2 months ago
Aspect-Oriented Requirements Engineering for Component-Based Software Systems
Developing requirements for software components, and ensuring these requirements are met by component designs, is very challenging, as very often application domain and stakeholde...
John C. Grundy
CRYPTO
1998
Springer
109views Cryptology» more  CRYPTO 1998»
15 years 2 months ago
Self-Delegation with Controlled Propagation - or - What If You Lose Your Laptop
We introduce delegation schemes wherein a user may delegate certain rights to himself, but may not safely delegate these rights to others. In our motivating application, a user ha...
Oded Goldreich, Birgit Pfitzmann, Ronald L. Rivest
SSDBM
1997
IEEE
96views Database» more  SSDBM 1997»
15 years 2 months ago
Summarizability in OLAP and Statistical Data Bases
Summarizability of OLAP and Statistical Databases is an a extremely important property because violating this condition can lead to erroneous conclusions and decisions. In this pa...
Hans-Joachim Lenz, Arie Shoshani
ICCAD
1996
IEEE
80views Hardware» more  ICCAD 1996»
15 years 2 months ago
Generalized constraint generation in the presence of non-deterministic parasitics
In a constraint-drivenlayout synthesisenvironment,parasitic constraints are generated and implemented in each phase of the design process to meet a given set of performance specif...
Edoardo Charbon, Paolo Miliozzi, Enrico Malavasi, ...