Sciweavers

383 search results - page 73 / 77
» Testing Concurrent Systems: A Formal Approach
Sort
View
ICFP
2001
ACM
15 years 9 months ago
Macros as Multi-Stage Computations: Type-Safe, Generative, Binding Macros in MacroML
With few exceptions, macros have traditionally been viewed as operations on syntax trees or even on plain strings. This view makes macros seem ad hoc, and is at odds with two desi...
Steven E. Ganz, Amr Sabry, Walid Taha
ECOOP
2008
Springer
14 years 11 months ago
Flow Analysis of Code Customizations
Inconsistency between metadata and code customizations is a major concern in modern, configurable enterprise systems. The increasing reliance on metadata, in the form of XML files,...
Anders Hessellund, Peter Sestoft
CRITIS
2007
14 years 11 months ago
A Malware Detector Placement Game for Intrusion Detection
We propose and investigate a game-theoretic approach to the malware filtering and detector placement problem which arises in network security. Our main objective is to develop opt...
Stephan Schmidt, Tansu Alpcan, Sahin Albayrak, Tam...
107
Voted
CORR
2007
Springer
154views Education» more  CORR 2007»
14 years 9 months ago
Application of a design space exploration tool to enhance interleaver generation
This paper presents a methodology to efficiently explore the design space of communication adapters. In most digital signal processing (DSP) applications, the overall performance ...
Cyrille Chavet, Philippe Coussy, Pascal Urard, Eri...
COMPSEC
2010
122views more  COMPSEC 2010»
14 years 7 months ago
Taming role mining complexity in RBAC
In this paper we address the problem of reducing the role mining complexity in RBAC systems. To this aim, we propose a three steps methodology: first, we associate a weight to rol...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...