Sciweavers

1728 search results - page 303 / 346
» Formal Modeling of Process Migration
Sort
View
ACSAC
2006
IEEE
14 years 3 months ago
PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware
Modern malware often hide the malicious portion of their program code by making it appear as data at compiletime and transforming it back into executable code at runtime. This obf...
Paul Royal, Mitch Halpin, David Dagon, Robert Edmo...
INFOCOM
2005
IEEE
14 years 3 months ago
Optimizing cost-sensitive trust-negotiation protocols
Trust negotiation is a process that establishes mutual trust by the exchange of digital credentials and/or guiding policies among entities who may have no pre-existing knowledge a...
Weifeng Chen, L. Clarke, James F. Kurose, Donald F...
WEBI
2005
Springer
14 years 3 months ago
Efficient Extraction of Closed Motivic Patterns in Multi-Dimensional Symbolic Representations of Music
In this paper, we present an efficient model for discovering repeated patterns in symbolic representations of music. Combinatorial redundancy inherent to the pattern discovery pa...
Olivier Lartillot
ICML
2004
IEEE
14 years 3 months ago
Active learning using pre-clustering
The paper is concerned with two-class active learning. While the common approach for collecting data in active learning is to select samples close to the classification boundary,...
Hieu Tat Nguyen, Arnold W. M. Smeulders
ATAL
2004
Springer
14 years 3 months ago
Trust Dynamics: How Trust Is Influenced by Direct Experiences and by Trust Itself
In this paper we will examine two main aspects of trust dynamics: a) How direct experiences involving trust, with their successes or failures, influence the future trust of an age...
Rino Falcone, Cristiano Castelfranchi