Sciweavers

105 search results - page 14 / 21
» A Hypermedia Version Control Framework
Sort
View
PEPM
2010
ACM
14 years 4 months ago
Context-sensitive analysis of obfuscated x86 executables
A method for context-sensitive analysis of binaries that may have obfuscated procedure call and return operations is presented. Such binaries may use operators to directly manipul...
Arun Lakhotia, Davidson R. Boccardo, Anshuman Sing...
RECSYS
2009
ACM
14 years 2 months ago
Preference elicitation with subjective features
Utility or preference elicitation is a critical component in many recommender and decision support systems. However, most frameworks for elicitation assume a predefined set of fe...
Craig Boutilier, Kevin Regan, Paolo Viappiani
CSMR
2007
IEEE
14 years 1 months ago
A Feature-Oriented Adaptive Component Model for Dynamic Evolution
Dynamic adaptation has been an essential requirement for more and more business systems. Some research works have focused on the structural or behavioral changes of adaptive progr...
Xin Peng, Yijian Wu, Wenyun Zhao
HASE
1998
IEEE
13 years 11 months ago
Design for Constraint Violation Detection in Safety-Critical Systems
In safety-critical systems, certain safety constraints must be satisfied before an operation can be performed. Such constraints typically depend on the state of the system at the ...
Satish Subramanian, Sanjai Rayadurgam, Wei-Tek Tsa...
ENTCS
2006
136views more  ENTCS 2006»
13 years 7 months ago
Classically-controlled Quantum Computation
It is reasonable to assume that quantum computations take place under the control of the classical world. For modelling this standard situation, we introduce a Classically-control...
Simon Perdrix, Philippe Jorrand