Results 41 to 50 of about 49,891 (172)

An Executable Specification of Map-Join-Reduce Using Haskell

open access: yesIEEE Access, 2019
The Map-Join-Reduce programming model effectively supports the join operation among different heterogeneous data sets by adding the Join module and processes the multiway joining directly.
Junqi Ren   +4 more
doaj   +1 more source

Comparative Study of Eight Formal Specifications of the Message Authenticator Algorithm [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2018
The Message Authenticator Algorithm (MAA) is one of the first cryptographic functions for computing a Message Authentication Code. Between 1987 and 2001, the MAA was adopted in international standards (ISO 8730 and ISO 8731-2) to ensure the authenticity ...
Hubert Garavel, Lina Marsso
doaj   +1 more source

Task Frames [PDF]

open access: yesarXiv, 2000
Forty years ago Dijkstra introduced the current conventional execution of routines. It places activation frames onto a stack. Each frame is the internal state of an executing routine. The resulting application execution is not easily helped by an external system. This presentation proposes an alternative execution of routines.
arxiv  

Creation of Automatic Protection System for Executable Files under OS Linux

open access: yesБезопасность информационных технологий, 2010
The main goal of this work is the creation of the automatic protection system for executable files under OS Linux. Existing automatic protection systems for executable files and their functional properties are analyzed.
D. M. Timovsky
doaj  

Publishing computational research - a review of infrastructures for reproducible and transparent scholarly communication

open access: yesResearch Integrity and Peer Review, 2020
Background The trend toward open science increases the pressure on authors to provide access to the source code and data they used to compute the results reported in their scientific papers.
Markus Konkol   +2 more
doaj   +1 more source

An Interactive Model-Driven Simulation Approach for Dynamic Behavior Analysis in Armed Conflicts

open access: yesIEEE Access, 2018
As system dynamic behaviors are difficult to capture and analyze in model-based systems engineering, executable architectures, and simulation methods are widely studied to understand the behaviors that result from interactions amongst system components ...
Minghao Li   +3 more
doaj   +1 more source

Generating Antivirus Evasive Executables Using Code Mutation [PDF]

open access: yesInformatică economică, 2018
The paper is focus around developing a utility tool based on a python component and a C++ stub in order to compile executable Windows files that are capable of staying undetected to Antivirus solutions.
Stefan Sabin NICULA
doaj   +1 more source

Concurrent Models for Object Execution [PDF]

open access: yesarXiv, 2012
In previous work we developed a framework of computational models for the concurrent execution of functions on different levels of abstraction. It shows that the traditional sequential execution of function is just a possible implementation of an abstract computational model that allows for the concurrent execution of function. We use this framework as
arxiv  

Robot Action Diagnosis and Experience Correction by Falsifying Parameterised Execution Models [PDF]

open access: yesarXiv, 2021
When faced with an execution failure, an intelligent robot should be able to identify the likely reasons for the failure and adapt its execution policy accordingly. This paper addresses the question of how to utilise knowledge about the execution process, expressed in terms of learned constraints, in order to direct the diagnosis and experience ...
arxiv  

Efficient Detection and Classification of Internet-of-Things Malware Based on Byte Sequences from Executable Files

open access: yesIEEE Open Journal of the Computer Society, 2020
Simple implementation and autonomous operation features make the Internet-of-Things (IoT) vulnerable to malware attacks. Static analysis of IoT malware executable files is a feasible approach to understanding the behavior of IoT malware for mitigation ...
Tzu-Ling Wan   +7 more
doaj   +1 more source

Home - About - Disclaimer - Privacy