Sciweavers

431 search results - page 61 / 87
» 4OR: Year 4
Sort
View
CCS
2010
ACM
13 years 7 months ago
Input generation via decomposition and re-stitching: finding bugs in Malware
Attackers often take advantage of vulnerabilities in benign software, and the authors of benign software must search their code for bugs in hopes of finding vulnerabilities before...
Juan Caballero, Pongsin Poosankam, Stephen McCaman...
BMCBI
2008
85views more  BMCBI 2008»
13 years 7 months ago
SPSmart: adapting population based SNP genotype databases for fast and comprehensive web access
Background: In the last five years large online resources of human variability have appeared, notably HapMap, Perlegen and the CEPH foundation. These databases of genotypes with p...
Jorge Amigo, Antonio Salas, Christopher Phillips, ...
CCR
2008
86views more  CCR 2008»
13 years 7 months ago
The need for simulation in evaluating anomaly detectors
Anomalous events that affect the performance of networks are a fact of life. It is therefore not surprising that recent years have seen an explosion in research on network anomaly...
Haakon Ringberg, Matthew Roughan, Jennifer Rexford
IJVR
2008
118views more  IJVR 2008»
13 years 7 months ago
Use of Technology Enhanced Education to Improve Teaching and Learning Process
The modern world continues to change as Information Technology (IT) related applications proceed to evolve at a rapid pace. The need for IT continues to grow as we begin to meaning...
Daniela Marghitu, Elizabeth Zylla-Jones, Santosh B...
IJKL
2006
57views more  IJKL 2006»
13 years 7 months ago
MBA knowledge management course: is there an impact after graduation?
: The purpose of this paper is twofold. The first is to present the structure of a course entitled `Strategic Knowledge Management' taught at the MBA level at the DeGroote Sch...
Nick Bontis, Alexander Serenko, Ernest Biktimirov