Sciweavers

1575 search results - page 277 / 315
» Constraining Software Evolution
Sort
View
RAID
2009
Springer
14 years 5 months ago
Using Formal Grammar and Genetic Operators to Evolve Malware
In this paper, we leverage the concepts of formal grammar and genetic operators to evolve malware. As a case study, we take COM infectors and design their formal grammar with produ...
Sadia Noreen, Shafaq Murtaza, M. Zubair Shafiq, Mu...
GROUP
2009
ACM
14 years 5 months ago
Is Wikipedia growing a longer tail?
Wikipedia has millions of articles, many of which receive little attention. One group of Wikipedians believes these obscure entries should be removed because they are uninterestin...
Shyong K. Lam, John Riedl
HT
2009
ACM
14 years 5 months ago
Statistical properties of inter-arrival times distribution in social tagging systems
Folksonomies provide a rich source of data to study social patterns taking place on the World Wide Web. Here we study the temporal patterns of users’ tagging activity. We show t...
Andrea Capocci, Andrea Baldassarri, Vito Domenico ...
ICIW
2008
IEEE
14 years 5 months ago
Networking Aspects for Gaming Systems
As the evolution of computer technology introduces new advances in networks among others, online gaming becomes a new trend. Following the trends of our era, Games At Large IST Pr...
Christos Bouras, Vassilis Poulopoulos, Ioannis Sen...
SP
2008
IEEE
144views Security Privacy» more  SP 2008»
14 years 5 months ago
Cloaker: Hardware Supported Rootkit Concealment
Rootkits are used by malicious attackers who desire to run software on a compromised machine without being detected. They have become stealthier over the years as a consequence of...
Francis M. David, Ellick Chan, Jeffrey C. Carlyle,...