Sciweavers

1143 search results - page 167 / 229
» Extraction in software watermarking
Sort
View
ICFEM
2007
Springer
14 years 1 months ago
Automating Refinement Checking in Probabilistic System Design
Abstract. Refinement plays a crucial role in "top-down" styles of verification, such as the refinement calculus, but for probabilistic systems proof of refinement is a pa...
Carlos Gonzalia, Annabelle McIver
AMAST
2004
Springer
14 years 1 months ago
A Language for Configuring Multi-level Specifications
Abstract. This paper shows how systems can be built from their component parts with specified sharing. Its principle contribution is a modular language for configuring systems. A c...
Gillian Hill, Steven Vickers
ARC
2006
Springer
122views Hardware» more  ARC 2006»
14 years 1 months ago
UNITE: Uniform Hardware-Based Network Intrusion deTection Engine
Abstract. Current software implementations of network intrusion detection reach a maximum network connection speed of about 1Gbps (Gigabits per second). This paper analyses the Sno...
Sherif Yusuf, Wayne Luk, M. K. N. Szeto, William G...
CSMR
2004
IEEE
14 years 1 months ago
A Distributed Architecture for Dynamic Analyses on User-Profile Data
Combining static and dynamic information is highly relevant in many reverse engineering, program comprehension and maintenance task. Dynamic analysis is particularly effective whe...
Giuliano Antoniol, Massimiliano Di Penta
CASES
2006
ACM
14 years 1 months ago
Power efficient branch prediction through early identification of branch addresses
Ever increasing performance requirements have elevated deeply pipelined architectures to a standard even in the embedded processor domain, requiring the incorporation of dynamic b...
Chengmo Yang, Alex Orailoglu