Sciweavers

431 search results - page 68 / 87
» A Case Study of Distributed, Asynchronous Software Inspectio...
Sort
View
KDD
2009
ACM
181views Data Mining» more  KDD 2009»
14 years 3 days ago
Intelligent file scoring system for malware detection from the gray list
Currently, the most significant line of defense against malware is anti-virus products which focus on authenticating valid software from a white list, blocking invalid software f...
Yanfang Ye, Tao Li, Qingshan Jiang, Zhixue Han, Li...
SIGSOFT
2010
ACM
13 years 5 months ago
Representation dependence testing using program inversion
The definition of a data structure may permit many different concrete representations of the same logical content. A (client) program that accepts such a data structure as input i...
Aditya Kanade, Rajeev Alur, Sriram K. Rajamani, Ga...
EMSOFT
2009
Springer
14 years 2 months ago
Flexible filters: load balancing through backpressure for stream programs
Stream processing is a promising paradigm for programming multi-core systems for high-performance embedded applications. We propose flexible filters as a technique that combines...
Rebecca L. Collins, Luca P. Carloni
ICSM
2008
IEEE
14 years 2 months ago
Standard-based data and service interoperability in eHealth systems
International standardization in information representation, organization, and dissemination are meant to eliminate the discrepancies in communication among participating organiza...
Kamran Sartipi, Mohammad H. Yarmand
ASWEC
2007
IEEE
14 years 1 months ago
A Configurable Event Correlation Architecture for Adaptive J2EE Applications
Distributed applications that adapt as their environment changes are developed from selfmanaging, self-configuring and self-optimising behaviours. This requires constant monitorin...
Yan Liu, Ian Gorton, Vinh Khanh Le