Sciweavers

2261 search results - page 433 / 453
» Dynamic types for authentication
Sort
View
DIMVA
2010
13 years 10 months ago
HookScout: Proactive Binary-Centric Hook Detection
Abstract. In order to obtain and maintain control, kernel malware usually makes persistent control flow modifications (i.e., installing hooks). To avoid detection, malware develope...
Heng Yin, Pongsin Poosankam, Steve Hanna, Dawn Xia...
LREC
2010
164views Education» more  LREC 2010»
13 years 10 months ago
The POETICON Corpus: Capturing Language Use and Sensorimotor Experience in Everyday Interaction
Natural language use, acquisition, and understanding takes place usually in multisensory and multimedia communication environments. Therefore, for one to model language in its int...
Katerina Pastra, Christian Wallraven, Michael Schu...
DAIS
2008
13 years 10 months ago
Brokering Planning Metadata in a P2P Environment
In self-adaptive systems, metadata about resources in the system (e.g., services, nodes) must be dynamically published, updated, and discarded. Current adaptive middleware approach...
Johannes Oudenstad, Romain Rouvoy, Frank Eliassen,...
EON
2008
13 years 10 months ago
Abductive Synthesis of the Mediator Scenario with jABC and GEM
We reuse here the framework, the setting, and the semantic modelling for the automated synthesis of the SWS Challenge Mediator presented in the companion paper [5], and show how to...
Christian Kubczak, Tiziana Margaria, Matthias Kais...
FORTE
2008
13 years 10 months ago
Distributed Semantics and Implementation for Systems with Interaction and Priority
The paper studies a distributed implementation method for the BIP (Behavior, Interaction, Priority) component framework for modeling heterogeneous systems. BIP offers two powerful ...
Ananda Basu, Philippe Bidinger, Marius Bozga, Jose...