Sciweavers

2661 search results - page 331 / 533
» Model Checking Performability Properties
Sort
View
ACSAC
2006
IEEE
14 years 4 months ago
PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware
Modern malware often hide the malicious portion of their program code by making it appear as data at compiletime and transforming it back into executable code at runtime. This obf...
Paul Royal, Mitch Halpin, David Dagon, Robert Edmo...
PLDI
2006
ACM
14 years 4 months ago
LOCKSMITH: context-sensitive correlation analysis for race detection
One common technique for preventing data races in multi-threaded programs is to ensure that all accesses to shared locations are consistently protected by a lock. We present a too...
Polyvios Pratikakis, Jeffrey S. Foster, Michael W....
ICFEM
2005
Springer
14 years 4 months ago
Visualizing and Simulating Semantic Web Services Ontologies
The development of Web Services has transformed the World Wide Web into a more application-aware information portal. The various standards ensure that Web Services are interpretabl...
Jun Sun 0001, Yuan-Fang Li, Hai H. Wang, Jing Sun
COOPIS
2003
IEEE
14 years 4 months ago
What Must (Not) Be Available Where?
Arranging the distribution of data, objects or components is a critical task that can ultimately affect the performance, integrity and reliability of distributed system. This pape...
Felix Bübl
POPL
1999
ACM
14 years 3 months ago
Type-Safe Linking and Modular Assembly Language
Linking is a low-level task that is usually vaguely specified, if at all, by language definitions. However, the security of web browsers and other extensible systems depends cru...
Neal Glew, J. Gregory Morrisett