Sciweavers

1039 search results - page 104 / 208
» The Def-inite Approach to Dependency Analysis
Sort
View
JWSR
2007
114views more  JWSR 2007»
15 years 1 months ago
Development of Distance Measures for Process Mining, Discovery and Integration
: Business processes continue to play an important role in today’s service-oriented enterprise computing systems. Mining, discovering, and integrating process-oriented services h...
Joonsoo Bae, Ling Liu, James Caverlee, Liang-Jie Z...
NDSS
2008
IEEE
15 years 8 months ago
HookFinder: Identifying and Understanding Malware Hooking Behaviors
Installing various hooks into the victim system is an important attacking strategy employed by malware, including spyware, rootkits, stealth backdoors, and others. In order to def...
Heng Yin, Zhenkai Liang, Dawn Song
VIP
2000
15 years 3 months ago
Functional Segmentation of Dynamic Emission Tomographic images
Emission tomography such as positron emission tomography (PET) and single-photon emission computed tomography (SPECT) can provide in vivo measurements of dynamic physiological and...
Koon-Pong Wong, David Dagan Feng, Steven R. Meikle...
ICCAD
1993
IEEE
139views Hardware» more  ICCAD 1993»
15 years 5 months ago
Hardware/software resolution of pipeline hazards in pipeline synthesis of instruction set processors
— One major problem in pipeline synthesis is the detection and resolution of pipeline hazards. In this paper we present a new solution to the problem in the domain of pipelined a...
Ing-Jer Huang, Alvin M. Despain
129
Voted
BCS
2008
15 years 3 months ago
Tools for Traceable Security Verification
Dependable systems evolution has been identified by the UK Computing Research Committee (UKCRC) as one of the current grand challenges for computer science. We present work toward...
Jan Jürjens, Yijun Yu, Andreas Bauer 0002