Sciweavers

1407 search results - page 31 / 282
» Using Use Cases in Executable Z
Sort
View
ICDE
2006
IEEE
192views Database» more  ICDE 2006»
15 years 8 months ago
Mining Executive Compensation Data from SEC Filings
In recent years, corporate governance has become a more and more important concern in investment decision-making. As one of the most important factors in evaluating corporate gove...
Chengmin Ding, Ping Chen
RTCSA
2006
IEEE
15 years 8 months ago
Portable Execution Time Analysis Method
We propose a new execution time prediction method that combines measurement-based execution time analysis and simulation-based memory access analysis. In measurement-based executi...
Keiji Yamamoto, Yutaka Ishikawa, Toshihiro Matsui
200
Voted
ESORICS
2011
Springer
14 years 2 months ago
Linear Obfuscation to Combat Symbolic Execution
Abstract. Trigger-based code (malicious in many cases, but not necessarily) only executes when specific inputs are received. Symbolic execution has been one of the most powerful t...
Zhi Wang, Jiang Ming, Chunfu Jia, Debin Gao
SP
2010
IEEE
182views Security Privacy» more  SP 2010»
15 years 6 months ago
All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask)
—Dynamic taint analysis and forward symbolic execution are quickly becoming staple techniques in security analyses. Example applications of dynamic taint analysis and forward sym...
Edward J. Schwartz, Thanassis Avgerinos, David Bru...
CCGRID
2010
IEEE
14 years 6 months ago
WORKEM: Representing and Emulating Distributed Scientific Workflow Execution State
- Scientific workflows have become an integral part of cyberinfrastructure as their computational complexity and data sizes have grown. However, the complexity of the distributed i...
Lavanya Ramakrishnan, Dennis Gannon, Beth Plale