Sciweavers

1583 search results - page 250 / 317
» Engineering Executable Agents using Multi-context Systems
Sort
View
SP
2010
IEEE
194views Security Privacy» more  SP 2010»
14 years 2 months ago
Identifying Dormant Functionality in Malware Programs
—To handle the growing flood of malware, security vendors and analysts rely on tools that automatically identify and analyze malicious code. Current systems for automated malwar...
Paolo Milani Comparetti, Guido Salvaneschi, Engin ...
SIGMOD
2012
ACM
220views Database» more  SIGMOD 2012»
12 years 16 days ago
GUPT: privacy preserving data analysis made easy
It is often highly valuable for organizations to have their data analyzed by external agents. However, any program that computes on potentially sensitive data risks leaking inform...
Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, D...
CODES
2008
IEEE
14 years 4 months ago
Static analysis of processor stall cycle aggregation
Processor Idle Cycle Aggregation (PICA) is a promising approach for low power execution of processors, in which small memory stalls are aggregated to create a large one, and the p...
Jongeun Lee, Aviral Shrivastava
IROS
2007
IEEE
112views Robotics» more  IROS 2007»
14 years 4 months ago
Orchestrating concurrency in robot swarms
— A functional approach to programming robot swarms brings with it well-defined properties that allow for automated concurrency and distributed execution. Further, the particula...
Anthony Cowley, Camillo J. Taylor
FSTTCS
2007
Springer
14 years 4 months ago
Automata and Logics for Timed Message Sequence Charts
Abstract. We provide a framework for distributed systems that impose timing constraints on their executions. We propose a timed model of communicating finite-state machines, which...
S. Akshay, Benedikt Bollig, Paul Gastin