Sciweavers

4307 search results - page 62 / 862
» Dynamic Spyware Analysis
Sort
View
CEC
2007
IEEE
13 years 11 months ago
A closed loop stability analysis and parameter selection of the Particle Swarm Optimization dynamics for faster convergence
This paper presents an alternative formulation of the PSO dynamics by a closed loop control system, and analyzes the stability behavior of the system by using Jury's test and ...
Nayan R. Samal, Amit Konar, Swagatam Das, Ajith Ab...
DAGM
2003
Springer
14 years 27 days ago
Image Sequence Analysis in Environmental and Live Sciences
Image sequence processing techniques are essential to study dynamical processes such as exchange, growth, and transport processes. In this survey paper, a generalized framework for...
Bernd Jähne
CSMR
2005
IEEE
14 years 1 months ago
A Comparison of Online and Dynamic Impact Analysis Algorithms
Impact analysis is the process of determining the effect, or impact, of a change to a software system. Dynamic impact analysis uses data obtained from executing a program to perfo...
Ben Breech, Mike Tegtmeyer, Lori L. Pollock
CSFW
2010
IEEE
13 years 11 months ago
Dynamic vs. Static Flow-Sensitive Security Analysis
—This paper seeks to answer fundamental questions about trade-offs between static and dynamic security analysis. It has been previously shown that flow-sensitive static informat...
Alejandro Russo, Andrei Sabelfeld
SP
2010
IEEE
182views Security Privacy» more  SP 2010»
13 years 11 months ago
All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask)
—Dynamic taint analysis and forward symbolic execution are quickly becoming staple techniques in security analyses. Example applications of dynamic taint analysis and forward sym...
Edward J. Schwartz, Thanassis Avgerinos, David Bru...