Sciweavers

806 search results - page 89 / 162
» A Practitioners
Sort
View
ACSAC
2006
IEEE
14 years 5 months ago
PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware
Modern malware often hide the malicious portion of their program code by making it appear as data at compiletime and transforming it back into executable code at runtime. This obf...
Paul Royal, Mitch Halpin, David Dagon, Robert Edmo...
AGILEDC
2006
IEEE
14 years 5 months ago
What Are We Arguing About? A Framework for Defining Agile in our Organization
How do we implement Agile? Is Agile a good thing for my organization? What barriers will I have to overcome? All of these are important questions when deciding whether and how to ...
Kelly Weyrauch
DATE
2006
IEEE
83views Hardware» more  DATE 2006»
14 years 5 months ago
What lies between design intent coverage and model checking?
Practitioners of formal property verification often work around the capacity limitations of formal verification tools by breaking down properties into smaller properties that ca...
Sayantan Das, Prasenjit Basu, Pallab Dasgupta, P. ...
EDOC
2006
IEEE
14 years 5 months ago
Exploring Intentional Modeling and Analysis for Enterprise Architecture
— An enterprise architecture is intended to be a comprehensive blueprint describing the key components and relationships for an enterprise from strategies to business processes t...
Eric S. K. Yu, Markus Strohmaier, Xiaoxue Deng
ETFA
2006
IEEE
14 years 5 months ago
Design Alternatives in the IEC 61499 Function Block Model
—The International Electro-technical Commission through the 61499 standard establishes the basic infrastructure towards an open market in the control and automation domain. This ...
Kleanthis Thramboulidis