Sciweavers

516 search results - page 87 / 104
» A Critical Analysis of Empirical Research in Software Testin...
Sort
View
RTAS
2005
IEEE
14 years 1 months ago
Timing Analysis of TCP Servers for Surviving Denial-of-Service Attacks
— Denial-of-service attacks are becoming more frequent and sophisticated. Researchers have proposed a variety of defenses, including better system configurations, infrastructure...
V. Krishna Nandivada, Jens Palsberg
JKM
2007
88views more  JKM 2007»
13 years 7 months ago
The concept of knowledge in KM: a dimensional model
Purpose: To sharpen the concepts of tacit, implicit and explicit knowledge by linking them to findings from cognitive psychology and memory science and thus finding a possibility ...
Bertolt Meyer, Kozo Sugiyama
CORR
2006
Springer
84views Education» more  CORR 2006»
13 years 7 months ago
The JRC-Acquis: A multilingual aligned parallel corpus with 20+ languages
We present a new, unique and freely available parallel corpus containing European Union (EU) documents of mostly legal nature. It is available in all 20 official EU languages, wit...
Ralf Steinberger, Bruno Pouliquen, Anna Widiger, C...
DATAMINE
2006
224views more  DATAMINE 2006»
13 years 7 months ago
Characteristic-Based Clustering for Time Series Data
With the growing importance of time series clustering research, particularly for similarity searches amongst long time series such as those arising in medicine or finance, it is cr...
Xiaozhe Wang, Kate A. Smith, Rob J. Hyndman
VIROLOGY
2010
179views more  VIROLOGY 2010»
13 years 5 months ago
Automatic binary deobfuscation
Abstract. This paper gives an overview of our research in the automation of the process of software protection analysis. We will focus more particularly on the problem of obfuscati...
Yoann Guillot, Alexandre Gazet