Sciweavers

1017 search results - page 151 / 204
» Architectural Building Blocks for Plug-and-Play System Desig...
Sort
View
ACSAC
2007
IEEE
14 years 3 months ago
HoneyIM: Fast Detection and Suppression of Instant Messaging Malware in Enterprise-Like Networks
Instant messaging (IM) has been one of most frequently used malware attack vectors due to its popularity. Distinct from other malware, it is straightforward for IM malware to fin...
Mengjun Xie, Zhenyu Wu, Haining Wang
ICSE
2010
IEEE-ACM
14 years 25 days ago
Collaborative reliability prediction of service-oriented systems
Service-oriented architecture (SOA) is becoming a major software framework for building complex distributed systems. Reliability of the service-oriented systems heavily depends on...
Zibin Zheng, Michael R. Lyu
COMPSAC
2008
IEEE
13 years 10 months ago
Fabrication of Ontology for Security in Health Care Systems
Given the widespread intimidation state of affairs, there is a gripping want to enlarge architectures, algorithms, and protocols to apprehend a trustworthy network infrastructure....
J. Indumathi, G. V. Uma
SOSP
2005
ACM
14 years 5 months ago
Implementing declarative overlays
Overlay networks are used today in a variety of distributed systems ranging from file-sharing and storage systems to communication infrastructures. However, designing, building a...
Boon Thau Loo, Tyson Condie, Joseph M. Hellerstein...
CORR
2011
Springer
273views Education» more  CORR 2011»
13 years 3 months ago
Natural Language Processing (almost) from Scratch
We propose a unified neural network architecture and learning algorithm that can be applied to various natural language processing tasks including: part-of-speech tagging, chunki...
Ronan Collobert, Jason Weston, Léon Bottou,...