Sciweavers

160 search results - page 25 / 32
» A PageRank based recommender system for identifying key clas...
Sort
View
CLEIEJ
2002
192views more  CLEIEJ 2002»
13 years 8 months ago
Automatic ObjectPascal Code Generation from Catalysis Specifications
This paper presents a Component-based Framework Development Process, of the Cardiology Domain. The Framework, called FrameCardio, was developed in 4 steps: 1Problem Domain Definit...
João Luís Cardoso de Moraes, Ant&oci...
ACSAC
2010
IEEE
13 years 6 months ago
Comprehensive shellcode detection using runtime heuristics
A promising method for the detection of previously unknown code injection attacks is the identification of the shellcode that is part of the attack vector using payload execution....
Michalis Polychronakis, Kostas G. Anagnostakis, Ev...
TASE
2011
IEEE
13 years 3 months ago
Dynamic Pricing and Inventory Control in a Make-to-Stock Queue With Information on the Production Status
: This paper addresses the dynamic pricing problem of a single-item, make-to-stock production system. Demand arrives according to Poisson processes with changeable arrival rate dep...
Liuxin Chen, Youhua Chen, Zhan Pang
NSPW
2006
ACM
14 years 2 months ago
Dark application communities
In considering new security paradigms, it is often worthwhile to anticipate the direction and nature of future attack paradigms. We identify a class of attacks based on the idea o...
Michael E. Locasto, Angelos Stavrou, Angelos D. Ke...
JCS
2011
138views more  JCS 2011»
12 years 11 months ago
Automatic analysis of malware behavior using machine learning
Malicious software—so called malware—poses a major threat to the security of computer systems. The amount and diversity of its variants render classic security defenses ineffe...
Konrad Rieck, Philipp Trinius, Carsten Willems, Th...