Sciweavers

160 search results - page 18 / 32
» Extracting Behavior Specification of Components in Legacy Ap...
Sort
View
INFORMATICALT
2000
114views more  INFORMATICALT 2000»
13 years 8 months ago
The Language-Centric Program Generator Models: 3L Paradigm
Abstract. In this paper we suggest a three-language (3L) paradigm for building the program generator models. The basis of the paradigm is a relationship model of the specification,...
Vytautas Stuikys, Giedrius Ziberkas, Robertas Dama...
CCS
2008
ACM
13 years 10 months ago
Ether: malware analysis via hardware virtualization extensions
Malware has become the centerpiece of most security threats on the Internet. Malware analysis is an essential technology that extracts the runtime behavior of malware, and supplie...
Artem Dinaburg, Paul Royal, Monirul I. Sharif, Wen...
TC
2002
13 years 8 months ago
Support for Recovery in Mobile Systems
Abstract--Mobile systems increasingly are being used for production-grade datacentered applications which require system support for transactional properties. For mobile applicatio...
Cris Pedregal Martin, Krithi Ramamritham
HIPC
2009
Springer
13 years 6 months ago
Detailed analysis of I/O traces for large scale applications
- In this paper, we present a tool to extract I/O traces from very large applications running at full scale during their production runs. We analyze these traces to gain informatio...
Nithin Nakka, Alok N. Choudhary, Wei-keng Liao, Le...
DIMVA
2004
13 years 10 months ago
Structural Comparison of Executable Objects
: A method to heuristically construct an isomorphism between the sets of functions in two similar but differing versions of the same executable file is presented. Such an isomorphi...
Halvar Flake