Sciweavers

117 search results - page 10 / 24
» On the behavioral diversity of random programs
Sort
View
CCS
2010
ACM
13 years 8 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
SAC
1998
ACM
14 years 24 days ago
Off-line scheduling of a real-time system
This paper shows how a recently introduced class of applications can be solved by constraint programming. This new type of application is due to the emergence of special real-time...
Klaus Schild, Jörg Würtz
CHI
2008
ACM
14 years 9 months ago
Creativity interventions: physical-digital activities for promoting group creativity
Arizona State University's Arts, Media, and Engineering Program is currently addressing the need to assess the growth of group creativity in trans-disciplinary collaboration....
Lisa M. Tolentino, Aisling Kelliher, David Birchfi...
WWW
2009
ACM
14 years 9 months ago
Using static analysis for Ajax intrusion detection
We present a static control-flow analysis for JavaScript programs running in a web browser. Our analysis tackles numerous challenges posed by modern web applications including asy...
Arjun Guha, Shriram Krishnamurthi, Trevor Jim
BMCBI
2002
136views more  BMCBI 2002»
13 years 8 months ago
Making sense of EST sequences by CLOBBing them
Background: Expressed sequence tags (ESTs) are single pass reads from randomly selected cDNA clones. They provide a highly cost-effective method to access and identify expressed g...
John Parkinson, David B. Guiliano, Mark L. Blaxter