Sciweavers

6253 search results - page 304 / 1251
» Use Case Modeling Guidelines
Sort
View
SCAM
2006
IEEE
15 years 10 months ago
Normalizing Metamorphic Malware Using Term Rewriting
Metamorphic malware — including certain viruses and worms — rewrite their code during propagation. This paper presents a method for normalizing multiple variants of metamorphi...
Andrew Walenstein, Rachit Mathur, Mohamed R. Chouc...
QEST
2010
IEEE
15 years 1 months ago
Automatic Compositional Reasoning for Probabilistic Model Checking of Hardware Designs
Adaptive techniques like voltage and frequency scaling, process variations and the randomness of input data contribute signi cantly to the statistical aspect of contemporary hardwa...
Jayanand Asok Kumar, Shobha Vasudevan
COMPSAC
2008
IEEE
15 years 10 months ago
Measuring Network Security Using Bayesian Network-Based Attack Graphs
Given the increasing dependence of our societies on information systems, the overall security of these systems should be measured and improved. Existing work generally focuses on ...
Marcel Frigault, Lingyu Wang
IEAAIE
2005
Springer
15 years 9 months ago
Predicting Construction Litigation Outcome Using Particle Swarm Optimization
Construction claims are normally affected by a large number of complex and interrelated factors. It is highly desirable for the parties to a dispute to know with some certainty how...
Kwok-wing Chau
146
Voted
MASCOTS
2010
15 years 5 months ago
Content Delivery Using Replicated Digital Fountains
With a majority of Internet traffic being predicted to be caused by content delivery, it is clear that content delivery applications will consume much of the resources on the Inter...
Niklas Carlsson, Derek L. Eager