Sciweavers

106 search results - page 7 / 22
» Reflective Analysis of the Syntax and Semantics of the i* Fr...
Sort
View
SP
2009
IEEE
262views Security Privacy» more  SP 2009»
14 years 2 months ago
Automatic Reverse Engineering of Malware Emulators
Malware authors have recently begun using emulation technology to obfuscate their code. They convert native malware binaries into bytecode programs written in a randomly generated...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...
DAGSTUHL
2007
13 years 9 months ago
Exploiting the ASM method within the Model-driven Engineering paradigm
act notation, so separating the abstract syntax and semantics of the language constructs from their different concrete notations. Although the foundation constituents of the MDE a...
Angelo Gargantini, Elvinia Riccobene, Patrizia Sca...
TSMC
2011
289views more  TSMC 2011»
13 years 2 months ago
Formalizing Functional Flow Block Diagrams Using Process Algebra and Metamodels
Abstract—Functional flow block diagrams (FFBDs) are a traditional tool of systems engineering and remain popular in some systems engineering domains. However, their lack of form...
Allan I. McInnes, Brandon K. Eames, Russell J. Gro...
KDD
2004
ACM
210views Data Mining» more  KDD 2004»
14 years 8 months ago
Web usage mining based on probabilistic latent semantic analysis
The primary goal of Web usage mining is the discovery of patterns in the navigational behavior of Web users. Standard approaches, such as clustering of user sessions and discoveri...
Xin Jin, Yanzan Zhou, Bamshad Mobasher
COLING
1992
13 years 9 months ago
A Lexicalist Account of Icelandic Case Marking
Recent theoretical descriptions of the Icelandic case system distinguish between lexicai and structural case. Lexical case is assigned in ttle lexiCOIl, whereas structural case is...
Gosse Bouma