Sciweavers

7596 search results - page 1475 / 1520
» Challenges in forensic computing
Sort
View
CCS
2010
ACM
13 years 10 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
SIGCOMM
2010
ACM
13 years 10 months ago
Cloudward bound: planning for beneficial migration of enterprise applications to the cloud
In this paper, we tackle challenges in migrating enterprise services into hybrid cloud-based deployments, where enterprise operations are partly hosted on-premise and partly in th...
Mohammad Y. Hajjat, Xin Sun, Yu-Wei Eric Sung, Dav...
WWW
2010
ACM
13 years 10 months ago
Using a model of social dynamics to predict popularity of news
Popularity of content in social media is unequally distributed, with some items receiving a disproportionate share of attention from users. Predicting which newly-submitted items ...
Kristina Lerman, Tad Hogg
AI
2010
Springer
13 years 10 months ago
Automatically generating personalized user interfaces with Supple
Today's computer-human interfaces are typically designed with the assumption that they are going to be used by an able-bodied person, who is using a typical set of input and ...
Krzysztof Z. Gajos, Daniel S. Weld, Jacob O. Wobbr...
BMCBI
2010
150views more  BMCBI 2010»
13 years 10 months ago
Systematic calibration of a cell signaling network model
Background: Mathematical modeling is being applied to increasingly complex biological systems and datasets; however, the process of analyzing and calibrating against experimental ...
Kyoung Ae Kim, Sabrina L. Spencer, John G. Albeck,...
« Prev « First page 1475 / 1520 Last » Next »