Sciweavers

2880 search results - page 33 / 576
» Types are calling conventions
Sort
View
SEC
2008
15 years 1 months ago
HoneyID : Unveiling Hidden Spywares by Generating Bogus Events
A particular type of spyware which uses the user's events covertly, such as keyloggers and password stealers, has become a big threat to Internet users. Due to the prevalence ...
Jeheon Han, Jonghoon Kwon, Heejo Lee
GPEM
2006
127views more  GPEM 2006»
14 years 11 months ago
A hierarchical particle swarm optimizer for noisy and dynamic environments
New Particle Swarm Optimization (PSO) methods for dynamic and noisy function optimization are studied in this paper. The new methods are based on the hierarchical PSO (H-PSO) and a...
Stefan Janson, Martin Middendorf
ISI
2004
Springer
15 years 5 months ago
Aligning Simulation Models of Smallpox Outbreaks
We aligned two fundamentally different models of smallpox transmission after a bioterrorist attack: A location-explicit multi-agent model (BioWar) and the conventional epidemiologi...
Li-Chiou Chen, Boris Kaminsky, Tiffany Tummino, Ka...
COMPSAC
2002
IEEE
15 years 4 months ago
A Case Study of Dependable Software Upgrade with Distributed Components
Technology presented in the paper [1] allows validation of software architecture before component upgrades. This paper presents a case study of applying this method to the upgrade ...
J. Jenny Li, Xueshan Shan
ICSE
1999
IEEE-ACM
15 years 4 months ago
A Practical Method for Verifying Event-Driven Software
Formal verification methods are used only sparingly in software development. The most successful methods to date are based on the use of model checking tools. To use such he user ...
Gerard J. Holzmann, Margaret H. Smith