Sciweavers

371 search results - page 39 / 75
» From the Guest Editors
Sort
View
CCS
2008
ACM
13 years 9 months ago
Ether: malware analysis via hardware virtualization extensions
Malware has become the centerpiece of most security threats on the Internet. Malware analysis is an essential technology that extracts the runtime behavior of malware, and supplie...
Artem Dinaburg, Paul Royal, Monirul I. Sharif, Wen...
JC
2007
64views more  JC 2007»
13 years 7 months ago
Quadrature in Besov spaces on the Euclidean sphere
Let q ≥ 1 be an integer, Sq denote the unit sphere embedded in the Euclidean space Rq+1, and µq be its Lebesgue surface measure. We establish upper and lower bounds for sup fâˆ...
Kerstin Hesse, H. N. Mhaskar, Ian H. Sloan
CHI
2002
ACM
14 years 8 months ago
LAFCam: Leveraging affective feedback camcorder
If a video camera recognizes and records affective data from the camera operator, this data can help determine which sequences will be interesting to the camera operator at a late...
Andrea Lockerd, Florian Mueller
ICSM
2008
IEEE
14 years 2 months ago
Non-invasive and non-scattered annotations for more robust pointcuts
Annotations are often mentioned as a potential alternative to tackle the fragile nature of AspectJ pointcuts. However, annotations themselves can be considered crosscutting elemen...
Leonardo Silva, Samuel Domingues, Marco Tulio de O...
AIED
2007
Springer
14 years 1 months ago
Helping Courseware Authors to Build Ontologies: The Case of TM4L
The authors of topic map-based learning resources face major difficulties in constructing the underlying ontologies. In this paper we propose two approaches to address this problem...
Darina Dicheva, Christo Dichev