Sciweavers

166 search results - page 22 / 34
» A Software Fault Tree Approach to Requirements Analysis of a...
Sort
View
ICCAD
2010
IEEE
186views Hardware» more  ICCAD 2010»
13 years 6 months ago
Application-Aware diagnosis of runtime hardware faults
Extreme technology scaling in silicon devices drastically affects reliability, particularly because of runtime failures induced by transistor wearout. Currently available online t...
Andrea Pellegrini, Valeria Bertacco
SIGMOD
2006
ACM
150views Database» more  SIGMOD 2006»
14 years 8 months ago
On-the-fly sharing for streamed aggregation
Data streaming systems are becoming essential for monitoring applications such as financial analysis and network intrusion detection. These systems often have to process many simi...
Sailesh Krishnamurthy, Chung Wu, Michael J. Frankl...
KDD
2007
ACM
566views Data Mining» more  KDD 2007»
14 years 9 months ago
IMDS: intelligent malware detection system
The proliferation of malware has presented a serious threat to the security of computer systems. Traditional signature-based antivirus systems fail to detect polymorphic and new, ...
Yanfang Ye, Dingding Wang, Tao Li, Dongyi Ye
ICSE
2008
IEEE-ACM
14 years 9 months ago
Detecting model inconsistency through operation-based model construction
Nowadays, large-scale industrial software systems may involve hundreds of developers working on hundreds of different but related models representing parts of the same system spec...
Xavier Blanc, Isabelle Mounier, Alix Mougenot, Tom...
VEE
2006
ACM
142views Virtualization» more  VEE 2006»
14 years 2 months ago
Secure and practical defense against code-injection attacks using software dynamic translation
One of the most common forms of security attacks involves exploiting a vulnerability to inject malicious code into an executing application and then cause the injected code to be ...
Wei Hu, Jason Hiser, Daniel Williams, Adrian Filip...