Sciweavers

433 search results - page 46 / 87
» Static Information Flow Analysis of Workflow Models
Sort
View
IJISEC
2008
119views more  IJISEC 2008»
13 years 7 months ago
Estimating the maximum information leakage
Preventing improper information leaks is a greatest challenge of the modern society. In this paper we present a technique for measuring the ability of several families of adversari...
Alessandro Aldini, Alessandra Di Pierro
DSS
2006
95views more  DSS 2006»
13 years 7 months ago
Process-driven collaboration support for intra-agency crime analysis
In law enforcement applications, there is a critical need for new tools that can facilitate efficient and effective collaboration. Through a field study, we observe that crime ana...
J. Leon Zhao, Henry H. Bi, Hsinchun Chen, Daniel D...
KDD
2006
ACM
176views Data Mining» more  KDD 2006»
14 years 8 months ago
A framework for analysis of dynamic social networks
Finding patterns of social interaction within a population has wide-ranging applications including: disease modeling, cultural and information transmission, and behavioral ecology...
Tanya Y. Berger-Wolf, Jared Saia
JPDC
2006
95views more  JPDC 2006»
13 years 7 months ago
Speculative pre-execution assisted by compiler (SPEAR)
Speculative pre-execution achieves efficient data prefetching by running additional prefetching threads on spare hardware contexts. Various implementations for speculative pre-exe...
Won Woo Ro, Jean-Luc Gaudiot
WORM
2003
13 years 9 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...