Sciweavers

810 search results - page 71 / 162
» Evolving a DSL Implementation
Sort
View
ISCAS
2006
IEEE
93views Hardware» more  ISCAS 2006»
14 years 4 months ago
Radial distribution power flow studies in a remotely distributed environment
—With the continued push toward dispersed generation and distributed intelligent devices throughout the distribution system, a proper analysis method for understanding the operat...
Michael Kleinberg, Karen Miu, Chika O. Nwankpa
KBSE
2006
IEEE
14 years 4 months ago
Modularity Analysis of Logical Design Models
Traditional design representations are inadequate for generalized reasoning about modularity in design and its technical and economic implications. We have developed an architectu...
Yuanfang Cai, Kevin J. Sullivan
SP
2006
IEEE
127views Security Privacy» more  SP 2006»
14 years 4 months ago
Siren: Catching Evasive Malware (Short Paper)
With the growing popularity of anomaly detection systems, which is due partly to the rise in zero-day attacks, a new class of threats have evolved where the attacker mimics legiti...
Kevin Borders, Xin Zhao, Atul Prakash
HT
2006
ACM
14 years 4 months ago
The evolution of metadata from standards to semantics in E-learning applications
Metadata attempts to describe the content, format, purpose and structure of data. Over the past few years, the IEEE-LOM standard has dominated the metadata world in e-learning app...
Hend S. Al-Khalifa, Hugh C. Davis
ACSAC
2005
IEEE
14 years 3 months ago
Dynamic Taint Propagation for Java
Improperly validated user input is the underlying root cause for a wide variety of attacks on web-based applications. Static approaches for detecting this problem help at the time...
Vivek Haldar, Deepak Chandra, Michael Franz