Sciweavers

217 search results - page 31 / 44
» Binet-Cauchy Kernels on Dynamical Systems and its Applicatio...
Sort
View
WWW
2010
ACM
14 years 2 months ago
Detection and analysis of drive-by-download attacks and malicious JavaScript code
JavaScript is a browser scripting language that allows developers to create sophisticated client-side interfaces for web applications. However, JavaScript code is also used to car...
Marco Cova, Christopher Krügel, Giovanni Vign...
EUROPAR
2003
Springer
14 years 23 days ago
Nswap: A Network Swapping Module for Linux Clusters
Cluster applications that process large amounts of data, such as parallel scientific or multimedia applications, are likely to cause swapping on individual cluster nodes. These ap...
Tia Newhall, Sean Finney, Kuzman Ganchev, Michael ...
CMS
2010
207views Communications» more  CMS 2010»
13 years 7 months ago
Statistical Detection of Malicious PE-Executables for Fast Offline Analysis
While conventional malware detection approaches increasingly fail, modern heuristic strategies often perform dynamically, which is not possible in many applications due to related ...
Ronny Merkel, Tobias Hoppe, Christian Krätzer...
MM
2004
ACM
191views Multimedia» more  MM 2004»
14 years 1 months ago
SwarmArt: interactive art from swarm intelligence
This paper describes SwarmArt, a collaborative project between computer science and art, which resulted in two installations of interactive art that incorporates swarm intelligenc...
Jeffrey E. Boyd, Gerald Hushlak, Christian Jacob
SAIG
2000
Springer
13 years 11 months ago
Generating Data Analysis Programs from Statistical Models
Extracting information from data, often also called data analysis, is an important scienti c task. Statistical approaches, which use methods from probability theory and numerical a...
Bernd Fischer 0002, Johann Schumann, Thomas Pressb...