Sciweavers

193 search results - page 36 / 39
» A Combined Concept Location Method for Java Programs
Sort
View
RAID
2010
Springer
13 years 5 months ago
Hybrid Analysis and Control of Malware
Abstract. Malware attacks necessitate extensive forensic analysis efforts that are manual-labor intensive because of the analysis-resistance techniques that malware authors employ....
Kevin A. Roundy, Barton P. Miller
BMCBI
2008
98views more  BMCBI 2008»
13 years 7 months ago
MTAP: The Motif Tool Assessment Platform
Background: In recent years, substantial effort has been applied to de novo regulatory motif discovery. At this time, more than 150 software tools exist to detect regulatory bindi...
Daniel Quest, Kathryn Dempsey, Mohammad Shafiullah...
AIWORC
2000
IEEE
13 years 11 months ago
Distance Learning Using Web-Based Multimedia Environment
The "schooling industry" is faced with an inescapable demand to redefine its endeavors in terms of producing learning, rather than providing instructions. We propose a h...
Khalid J. Siddiqui, Junaid Ahmed Zubairi
IEEEARES
2007
IEEE
14 years 1 months ago
Near Optimal Protection Strategies Against Targeted Attacks on the Core Node of a Network
The issue of information security has attracted increasing attention in recent years. In network attack and defense scenarios, attackers and defenders constantly change their resp...
Frank Yeong-Sung Lin, Po-Hao Tsang, Yi-Luen Lin
MIDDLEWARE
2007
Springer
14 years 1 months ago
Rule-based reasoning about qualitative spatiotemporal relations
This paper is about a novel rule-based approach for reasoning about qualitative spatiotemporal relations among technology-rich autonomous objects, to which we refer to as artifact...
Clemens Holzmann