Sciweavers

1938 search results - page 378 / 388
» Dependable Software
Sort
View
DIMVA
2008
13 years 9 months ago
Embedded Malware Detection Using Markov n-Grams
Embedded malware is a recently discovered security threat that allows malcode to be hidden inside a benign file. It has been shown that embedded malware is not detected by commerci...
M. Zubair Shafiq, Syed Ali Khayam, Muddassar Faroo...
FIW
2007
152views Communications» more  FIW 2007»
13 years 9 months ago
Considering Safety and Feature Interactions for Integrated Services of Home Network System
Assuring safety in the home network system (HNS) is a crucial issue to guarantee high quality of life. In this position paper, we first review our previous work, formulating three...
Ben Yan
ICMLA
2007
13 years 9 months ago
Understanding Challenges in Preserving and Reconstructing Computer-Assisted Medical Decision Processes
— This paper addresses the problem of understanding preservation and reconstruction requirements for computeraided medical decision-making. With an increasing number of computer-...
Sang-Chul Lee, Peter Bajcsy
IM
2007
13 years 9 months ago
A Generic Application-Oriented Performance Instrumentation for Multi-Tier Environments
— In this paper, we present a design for a generic, open, application-oriented performance instrumentation of multitier applications. Measurements are performed through configur...
Markus Schmid, Marcus Thoss, Thomas Termin, Reinho...
DMIN
2006
124views Data Mining» more  DMIN 2006»
13 years 9 months ago
Use of Multivariate Data Analysis for Lumber Drying Process Monitoring and Fault Detection
Process monitoring refers to the task of detecting abnormal process operations resulting from the shift in the mean and/or the variance of one or more process variables. To success...
Mouloud Amazouz, Radu Pantea