Sciweavers

1008 search results - page 85 / 202
» Multiobjective process controllability analysis
Sort
View
IJDE
2006
95views more  IJDE 2006»
13 years 10 months ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum
SAC
2009
ACM
14 years 2 months ago
Taking total control of voting systems: firmware manipulations on an optical scan voting terminal
The firmware of an electronic voting machine is typically treated as a “trusted” component of the system. Consequently, it is misconstrued to be vulnerable only to an insider...
Seda Davtyan, Sotiris Kentros, Aggelos Kiayias, La...
BMCBI
2006
169views more  BMCBI 2006»
13 years 10 months ago
Beyond microarrays: Finding key transcription factors controlling signal transduction pathways
Background: Massive gene expression changes in different cellular states measured by microarrays, in fact, reflect just an "echo" of real molecular processes in the cell...
Alexander E. Kel, Nico Voss, Ruy Jauregui, Olga V....
RSP
2007
IEEE
139views Control Systems» more  RSP 2007»
14 years 4 months ago
Rapid Prototyping of Distributed Real-Time Embedded Systems Using the AADL and Ocarina
Building Distributed Real-Time Embedded systems requires a stringent methodology, from early requirements capture to full implementation. However, there is a strong link between t...
Jérôme Hugues, Bechir Zalila, Laurent...
ICST
2009
IEEE
13 years 7 months ago
A Flexible Framework for Quality Assurance of Software Artefacts with Applications to Java, UML, and TTCN-3 Test Specifications
Manual reviews and inspections of software artefacts are time consuming and thus, automated analysis tools have been developed to support the quality assurance of software artefac...
Jens Nodler, Helmut Neukirchen, Jens Grabowski