Sciweavers

817 search results - page 144 / 164
» Malware behaviour analysis
Sort
View
EMSOFT
2004
Springer
14 years 7 days ago
Defining and translating a "safe" subset of simulink/stateflow into lustre
The Simulink/Stateflow toolset is an integrated suite enabling model-based design and has become popular in the automotive and aeronautics industries. We have previously developed...
Norman Scaife, Christos Sofronis, Paul Caspi, Stav...
EUROMICRO
2004
IEEE
14 years 7 days ago
SaveCCM - A Component Model for Safety-Critical Real-Time Systems
Component-based development has proven effective in many engineering domains, and several general component technologies are available. Most of these are focused on providing an e...
Hans Hansson, Mikael Åkerholm, Ivica Crnkovi...
CLEF
2006
Springer
14 years 7 days ago
iCLEF 2006 Overview: Searching the Flickr WWW Photo-Sharing Repository
This paper summarizes the task design for iCLEF 2006 (the CLEF interactive track). Compared to previous years, we have proposed a radically new task: searching images in a natural...
Jussi Karlgren, Julio Gonzalo, Paul Clough
APLAS
2003
ACM
14 years 5 days ago
Resource Usage Verification
We investigate how to automatically verify that resources such as files are not used improperly or unsafely by a program. We employ a mixture of compile-time analysis and run-time ...
Kim Marriott, Peter J. Stuckey, Martin Sulzmann
COORDINATION
2009
Springer
13 years 11 months ago
From Coordination to Stochastic Models of QoS
Abstract. Reo is a channel-based coordination model whose operational semantics is given by Constraint Automata (CA). Quantitative Constraint Automata extend CA (and hence, Reo) wi...
Farhad Arbab, Tom Chothia, Rob van der Mei, Sun Me...