Sciweavers

916 search results - page 128 / 184
» Activity Theory for the Analysis and Design of Multi-agent S...
Sort
View
WWW
2011
ACM
13 years 4 months ago
Prophiler: a fast filter for the large-scale detection of malicious web pages
Malicious web pages that host drive-by-download exploits have become a popular means for compromising hosts on the Internet and, subsequently, for creating large-scale botnets. In...
Davide Canali, Marco Cova, Giovanni Vigna, Christo...
EDOC
2007
IEEE
14 years 3 months ago
An Enterprise Architecture Alignment Measure for Telecom Service Development
The increasing complexity of modern Information Services (IS) makes necessary to carry on review activities. For many companies, these reviews take place within the framework of t...
Jacques Simonin, Yves Le Traon, Jean-Marc Jé...
IPPS
2006
IEEE
14 years 3 months ago
Network intrusion detection with semantics-aware capability
Malicious network traffic, including widespread worm activity, is a growing threat to Internet-connected networks and hosts. In this paper, we propose a network intrusion detectio...
Walter J. Scheirer, Mooi Choo Chuah
AROBOTS
2008
146views more  AROBOTS 2008»
13 years 9 months ago
Biologically-inspired 3D grasp synthesis based on visual exploration
Object grasping is a typical human ability which is widely studied from both a biological and an engineering point of view. This paper presents an approach to grasp synthesis inspi...
Gabriel Recatalá, Eris Chinellato, Angel P....
TCAD
2002
158views more  TCAD 2002»
13 years 8 months ago
Static power modeling of 32-bit microprocessors
The paper presents a novel strategy aimed at modelling instruction energy consumption of 32-bits microprocessors. Differently from former approaches, the proposed instruction-level...
Carlo Brandolese, Fabio Salice, William Fornaciari...