Sciweavers

220 search results - page 20 / 44
» Verifying a signature architecture: a comparative case study
Sort
View
ICICS
2007
Springer
15 years 5 months ago
Collecting Autonomous Spreading Malware Using High-Interaction Honeypots
Autonomous spreading malware in the form of worms or bots has become a severe threat in today’s Internet. Collecting the sample as early as possible is a necessary precondition f...
Jianwei Zhuge, Thorsten Holz, Xinhui Han, Chengyu ...
ASWEC
2007
IEEE
15 years 3 months ago
Influence Control for Dynamic Reconfiguration
Influence control is a very challenging issue in dynamic reconfiguration and still not well addressed in the literature. This paper argues that dynamic reconfiguration influences s...
Zhikun Zhao, Wei Li
CJ
2004
141views more  CJ 2004»
14 years 11 months ago
Modeling and Analysis of a Scheduled Maintenance System: a DSPN Approach
This paper describes a way to manage the modeling and analysis of Scheduled Maintenance Systems (SMS) within an analytically tractable context. We chose a significant case study h...
Andrea Bondavalli, Roberto Filippini
RECOMB
2007
Springer
16 years 17 hour ago
Multi-break Rearrangements: From Circular to Linear Genomes
Multi-break rearrangements break a genome into multiple fragments and further glue them together in a new order. While 2break rearrangements represent standard reversals, fusions, ...
Max A. Alekseyev
ESEC
1997
Springer
15 years 3 months ago
Verification of Liveness Properties Using Compositional Reachability Analysis
The software architecture of a distributed program can be represented by a hierarchical composition of subsystems, with interacting processes at the leaves of the hierarchy. Compo...
Shing-Chi Cheung, Dimitra Giannakopoulou, Jeff Kra...