Sciweavers

111 search results - page 12 / 23
» A Logic-Based Formalism to Model and Analyze Workflow Execut...
Sort
View
ACSAC
2006
IEEE
14 years 1 months ago
PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware
Modern malware often hide the malicious portion of their program code by making it appear as data at compiletime and transforming it back into executable code at runtime. This obf...
Paul Royal, Mitch Halpin, David Dagon, Robert Edmo...
OPODIS
2008
13 years 9 months ago
Evaluating a Data Removal Strategy for Grid Environments Using Colored Petri Nets
Abstract. In this paper we use colored Petri nets (CPNs) and the supporting CPN Tools for the modeling and performance analysis of grid architectures. The notation of Petri nets is...
Nikola Trcka, Wil M. P. van der Aalst, Carmen Brat...
DASFAA
2007
IEEE
266views Database» more  DASFAA 2007»
14 years 1 months ago
Compatibility Analysis and Mediation-Aided Composition for BPEL Services
In Service Oriented Architecture (SOA), the need for inter-service compatibility analysis has gone beyond what existing service composition/ verification approaches can handle. Giv...
Wei Tan, Fangyan Rao, Yushun Fan, Jun Zhu
FMOODS
2007
13 years 9 months ago
A Probabilistic Formal Analysis Approach to Cross Layer Optimization in Distributed Embedded Systems
We present a novel approach, based on probabilistic formal methods, to developing cross-layer resource optimization policies for resource limited distributed systems. One objective...
Minyoung Kim, Mark-Oliver Stehr, Carolyn L. Talcot...
ICTAI
2008
IEEE
14 years 1 months ago
Discovering Program's Behavioral Patterns by Inferring Graph-Grammars from Execution Traces
Frequent patterns in program executions represent recurring sequences of events. These patterns can be used to reveal the hidden structures of a program, and ease the comprehensio...
Chunying Zhao, Keven Ates, Jun Kong, Kang Zhang