Sciweavers

503 search results - page 38 / 101
» Data Flow Analysis for CCS
Sort
View
CCS
2007
ACM
15 years 9 months ago
Polyglot: automatic extraction of protocol message format using dynamic binary analysis
Protocol reverse engineering, the process of extracting the application-level protocol used by an implementation, without access to the protocol specification, is important for m...
Juan Caballero, Heng Yin, Zhenkai Liang, Dawn Xiao...
COOPIS
2004
IEEE
15 years 7 months ago
Implementing QoS Aware Component-Based Applications
By QoS (Quality of Service), we often refer to a set of quality requirements on the collective behavior of one or more objects. These requirements enable the provision of better se...
Avraam Chimaris, George A. Papadopoulos
115
Voted
CCS
2007
ACM
15 years 9 months ago
An analysis of browser domain-isolation bugs and a light-weight transparent defense mechanism
Browsers’ isolation mechanisms are critical to users’ safety and privacy on the web. Achieving proper isolations, however, is very difficult. Historical data show that even fo...
Shuo Chen, David Ross, Yi-Min Wang
IVS
2006
240views more  IVS 2006»
15 years 3 months ago
Business process impact visualization and anomaly detection
Business operations involve many factors and relationships and are modeled as complex business process workflows. The execution of these business processes generates vast volumes ...
Ming C. Hao, Daniel A. Keim, Umeshwar Dayal, J&oum...
117
Voted
VISSYM
2004
15 years 4 months ago
Case Study: Visualization of annotated DNA sequences
DNA sequences and their annotations form ever expanding data sets. Proper explorations of such data sets require new tools for visualization and analysis. In this case study, we h...
Tim H. J. M. Peeters, Huub van de Wetering, Mark W...