Sciweavers

153 search results - page 18 / 31
» Symbolic Implementation of the Best Transformer
Sort
View
NDSS
2008
IEEE
14 years 2 months ago
Impeding Malware Analysis Using Conditional Code Obfuscation
Malware programs that incorporate trigger-based behavior initiate malicious activities based on conditions satisfied only by specific inputs. State-of-the-art malware analyzers ...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...
EUROSSC
2007
Springer
14 years 1 months ago
Escalation:  Complex Event Detection in Wireless Sensor Networks
We present a new approach for the detection of complex events in Wireless Sensor Networks. Complex events are sets of data points that correspond to interesting or unusual patterns...
Michael Zoumboulakis, George Roussos
BIRTHDAY
2006
Springer
13 years 11 months ago
Verification by Parallelization of Parametric Code
Abstract. Loops and other unbound control structures constitute a major bottleneck in formal software verification, because correctness proofs over such control structures generall...
Tobias Gedell, Reiner Hähnle
WCE
2007
13 years 8 months ago
Performance Analysis of Adaptive Beamforming Algorithms for Orthogonal Frequency Division Multiplexing System
—Orthogonal Frequency Division Multiplexing (OFDM) is gaining popularity for high data rate communication systems. We propose the use of adaptive beamforming for interference rej...
Samra Jabeen, Shaheer Naeem, Syed Javed Hussain, A...
CORR
2010
Springer
67views Education» more  CORR 2010»
13 years 7 months ago
Similarity-based Reasoning in Qualified Logic Programming
Similarity-based Logic Programming (briefly, SLP) has been proposed to enhance the LP paradigm with a kind of approximate reasoning which supports flexible information retrieval a...
Rafael Caballero, Mario Rodríguez-Artalejo,...