Sciweavers

3296 search results - page 617 / 660
» Gathercast with Active Networks
Sort
View
WEBI
2009
Springer
14 years 5 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham
SIGECOM
2009
ACM
114views ECommerce» more  SIGECOM 2009»
14 years 4 months ago
Policy teaching through reward function learning
Policy teaching considers a Markov Decision Process setting in which an interested party aims to influence an agent’s decisions by providing limited incentives. In this paper, ...
Haoqi Zhang, David C. Parkes, Yiling Chen
ACSAC
2008
IEEE
14 years 4 months ago
The Evolution of System-Call Monitoring
Computer security systems protect computers and networks from unauthorized use by external agents and insiders. The similarities between computer security and the problem of prote...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...
BIBM
2008
IEEE
145views Bioinformatics» more  BIBM 2008»
14 years 4 months ago
Meta Analysis of Microarray Data Using Gene Regulation Pathways
Using microarray technology for genetic analysis in biological experiments requires computationally intensive tools to interpret results. The main objective here is to develop a â...
Saira Ali Kazmi, Yoo-Ah Kim, Baikang Pei, Ravi Nor...
FCCM
2008
IEEE
133views VLSI» more  FCCM 2008»
14 years 4 months ago
Autonomous System on a Chip Adaptation through Partial Runtime Reconfiguration
This paper presents a proto-type autonomous signal processing system on a chip. The system is architected such that high performance digital signal processing occurs in the FPGAâ€...
Matthew French, Erik Anderson, Dong-In Kang