Sciweavers

575 search results - page 34 / 115
» Introducing Service-Orientation into System Analysis and Des...
Sort
View
DIMVA
2010
13 years 7 months ago
dAnubis - Dynamic Device Driver Analysis Based on Virtual Machine Introspection
Abstract. In the escalating arms race between malicious code and security tools designed to analyze it, detect it or mitigate its impact, malicious code running inside the operatin...
Matthias Neugschwandtner, Christian Platzer, Paolo...
ECRTS
1998
IEEE
13 years 12 months ago
Facilitating worst-case execution times analysis for optimized code
In this paper we present co-transformation, a novel approach to the mapping of execution information from the source code of a program to the object code for the purpose of worst-...
Jakob Engblom, Andreas Ermedahl, Peter Altenbernd
DOLAP
2000
ACM
13 years 12 months ago
Towards OLAP Security Design - Survey and Research Issues
With the use of data warehousing and online analytical processing (OLAP) for decision support applications new security issues arise. The goal of this paper is to introduce an OLA...
Torsten Priebe, Günther Pernul
JSS
2006
112views more  JSS 2006»
13 years 7 months ago
Generalized comparison of graph-based ranking algorithms for publications and authors
Citation analysis helps in evaluating the impact of scientific collections (journals and conferences), publications and scholar authors. In this paper we examine known algorithms ...
Antonis Sidiropoulos, Yannis Manolopoulos
SIGDOC
2009
ACM
14 years 2 months ago
Semantic transparency in user assistance systems
In this paper we analyze the problem of “situating explanations” in user assistance systems. We introduce semantic transparency as a user interface property that enables givin...
Andrea Kohlhase, Michael Kohlhase