Sciweavers

716 search results - page 65 / 144
» Security Requirements Engineering: A Framework for Represent...
Sort
View
ESEC
1999
Springer
14 years 1 months ago
Data-Flow Analysis of Program Fragments
Traditional interprocedural data-flow analysis is performed on whole programs; however, such whole-program analysis is not feasible for large or incomplete programs. We propose fr...
Atanas Rountev, Barbara G. Ryder, William Landi
ISI
2008
Springer
13 years 8 months ago
Probabilistic frameworks for privacy-aware data mining
Often several cooperating parties would like to have a global view of their joint data for various data mining objectives, but cannot reveal the contents of individual records due...
Joydeep Ghosh
ICSEA
2009
IEEE
13 years 6 months ago
Integrating IT Service Management within the Enterprise Architecture
-- Published work in the IT services area is generally centered on the description of management best practices or specific technological issues. There is a lack of empirical studi...
Anacleto Correia, Fernando Brito e Abreu
PEPM
2010
ACM
14 years 5 months ago
Context-sensitive analysis of obfuscated x86 executables
A method for context-sensitive analysis of binaries that may have obfuscated procedure call and return operations is presented. Such binaries may use operators to directly manipul...
Arun Lakhotia, Davidson R. Boccardo, Anshuman Sing...
FSTTCS
2007
Springer
14 years 3 months ago
Program Analysis Using Weighted Pushdown Systems
Abstract. Pushdown systems (PDSs) are an automata-theoretic formalism for specifying a class of infinite-state transition systems. Infiniteness comes from the fact that each con...
Thomas W. Reps, Akash Lal, Nicholas Kidd