Sciweavers

1040 search results - page 185 / 208
» A Syntactical Approach to Revision
Sort
View
CAV
2011
Springer
216views Hardware» more  CAV 2011»
13 years 11 days ago
Malware Analysis with Tree Automata Inference
Abstract. The underground malware-based economy is flourishing and it is evident that the classical ad-hoc signature detection methods are becoming insufficient. Malware authors ...
Domagoj Babic, Daniel Reynaud, Dawn Song
KDD
2012
ACM
243views Data Mining» more  KDD 2012»
11 years 11 months ago
Storytelling in entity networks to support intelligence analysts
Intelligence analysts grapple with many challenges, chief among them is the need for software support in storytelling, i.e., automatically ‘connecting the dots’ between dispar...
M. Shahriar Hossain, Patrick Butler, Arnold P. Boe...
ICDE
2002
IEEE
112views Database» more  ICDE 2002»
14 years 10 months ago
Design and Evaluation of Alternative Selection Placement Strategies in Optimizing Continuous Queries
In this paper, we design and evaluate alternative selection placement strategies for optimizing a very large number of continuous queries in an Internet environment. Two grouping ...
Jianjun Chen, David J. DeWitt, Jeffrey F. Naughton
WWW
2007
ACM
14 years 9 months ago
Speeding up adaptation of web service compositions using expiration times
Web processes must often operate in volatile environments where the quality of service parameters of the participating service providers change during the life time of the process...
John Harney, Prashant Doshi
PLDI
2009
ACM
14 years 9 months ago
Semantics-aware trace analysis
As computer systems continue to become more powerful and comdo programs. High-level abstractions introduced to deal with complexity in large programs, while simplifying human reas...
Kevin J. Hoffman, Patrick Eugster, Suresh Jagannat...