Sciweavers

1407 search results - page 182 / 282
» Using Use Cases in Executable Z
Sort
View
SP
2010
IEEE
194views Security Privacy» more  SP 2010»
15 years 8 months ago
Identifying Dormant Functionality in Malware Programs
—To handle the growing flood of malware, security vendors and analysts rely on tools that automatically identify and analyze malicious code. Current systems for automated malwar...
Paolo Milani Comparetti, Guido Salvaneschi, Engin ...
124
Voted
APCSAC
2003
IEEE
15 years 7 months ago
Simultaneous MultiStreaming for Complexity-Effective VLIW Architectures
Very Long Instruction Word (VLIW) architectures exploit instruction level parallelism (ILP) with the help of the compiler to achieve higher instruction throughput with minimal hard...
Pradeep Rao, S. K. Nandy, M. N. V. Satya Kiran
ESAW
2009
Springer
15 years 10 months ago
Determining the Trustworthiness of New Electronic Contracts
Expressing contractual agreements electronically potentially allows agents to automatically perform functions surrounding contract use: establishment, fulfilment, renegotiation et...
Paul T. Groth, Simon Miles, Sanjay Modgil, Nir Ore...
CIA
2001
Springer
15 years 8 months ago
Cryptographic Protocols for Secure Second-Price Auctions
In recent years auctions have become more and more important in the field of multiagent systems as useful mechanisms for resource allocation, task assignment and last but not leas...
Felix Brandt
IPPS
2000
IEEE
15 years 8 months ago
Monotonic Counters: A New Mechanism for Thread Synchronization
Only a handful of fundamental mechanisms for synchronizing the access of concurrent threads to shared memory are widely implemented and used. These include locks, condition variab...
John Thornley, K. Mani Chandy