Sciweavers

93 search results - page 14 / 19
» Automatic Extraction of a WordNet-Like Identifier Network fr...
Sort
View
SP
2007
IEEE
135views Security Privacy» more  SP 2007»
14 years 1 months ago
Exploring Multiple Execution Paths for Malware Analysis
Malicious code (or malware) is defined as software that fulfills the deliberately harmful intent of an attacker. Malware analysis is the process of determining the behavior and ...
Andreas Moser, Christopher Krügel, Engin Kird...
ELPUB
2006
ACM
14 years 1 months ago
Weaving the Web of Science. HyperJournal and the Impact of the Semantic Web on Scientific Publishing
In this paper we present HyperJournal, an Open Source web application for publishing on-line Open Access scholarly journals. In the first part (sections 1-3) we briefly describe t...
Michele Barbera, Francesca Di Donato
IUI
2012
ACM
12 years 3 months ago
Summarizing sporting events using twitter
The status updates posted to social networks, such as Twitter and Facebook, contain a myriad of information about what people are doing and watching. During events, such as sports...
Jeffrey Nichols, Jalal Mahmud, Clemens Drews
APSEC
2001
IEEE
13 years 11 months ago
A Framework for Migrating Procedural Code to Object-Oriented Platforms
With the rapid growth of the Internet and pervasive computing activities, the migration of back-end legacy systems to network centric environments has become a focal point for res...
Ying Zou, Kostas Kontogiannis
DSN
2008
IEEE
14 years 1 months ago
Automated duplicate detection for bug tracking systems
Bug tracking systems are important tools that guide the maintenance activities of software developers. The utility of these systems is hampered by an excessive number of duplicate...
Nicholas Jalbert, Westley Weimer