Sciweavers

4307 search results - page 697 / 862
» Dynamic Spyware Analysis
Sort
View
ICDE
2010
IEEE
199views Database» more  ICDE 2010»
14 years 3 months ago
Mining mutation chains in biological sequences
— The increasing infectious disease outbreaks has led to a need for new research to better understand the disease’s origins, epidemiological features and pathogenicity caused b...
Chang Sheng, Wynne Hsu, Mong-Li Lee, Joo Chuan Ton...
AINA
2009
IEEE
14 years 3 months ago
Combined On-line and Off-line Trust Mechanism for Agent Computing
In this paper, we propose an efficient mechanism dealing with trust assessment for agent societies, aiming to accurately assess the trustworthiness of the collaborating agents. I...
Babak Khosravifar, Jamal Bentahar, Maziar Gomrokch...
CVPR
2009
IEEE
14 years 3 months ago
A distribution-based approach to tracking points in velocity vector fields
We address the problem of tracking points in dense vector fields. Such vector fields may come from computational fluid dynamics simulations, environmental monitoring sensors, o...
Liefei Xu, H. Quynh Dinh, Eugene Zhang, Zhongzang ...
HICSS
2009
IEEE
109views Biometrics» more  HICSS 2009»
14 years 3 months ago
The Construction of Peers and Artifacts: The Organizing Role of "Programming Guidelines"
In this paper, we1 study new organizational forms for production processes that emerge in large scale Free/Libre Open Source Software (FLOSS) projects. We will focus on the textua...
Vincenzo D'Andrea, Stefano De Paoli, Maurizio Teli
IEEEARES
2009
IEEE
14 years 3 months ago
A Framework for Understanding Botnets
Botnets have become a severe threat to the cyberspace. However, existing studies are typically conducted in an ad hoc fashion, by demonstrating specific analysis on captured bot ...
Justin Leonard, Shouhuai Xu, Ravi S. Sandhu