Sciweavers

7149 search results - page 1326 / 1430
» How dynamic is the Web
Sort
View
CCS
2008
ACM
15 years 6 months ago
Ether: malware analysis via hardware virtualization extensions
Malware has become the centerpiece of most security threats on the Internet. Malware analysis is an essential technology that extracts the runtime behavior of malware, and supplie...
Artem Dinaburg, Paul Royal, Monirul I. Sharif, Wen...
SDM
2007
SIAM
143views Data Mining» more  SDM 2007»
15 years 5 months ago
Less is More: Compact Matrix Decomposition for Large Sparse Graphs
Given a large sparse graph, how can we find patterns and anomalies? Several important applications can be modeled as large sparse graphs, e.g., network traffic monitoring, resea...
Jimeng Sun, Yinglian Xie, Hui Zhang, Christos Falo...
WSC
1994
15 years 5 months ago
General purpose simulation with stroboscope
Stroboscope is a programming language designed for the simulation of processes common to construction engineering. These processes are very complex and involve many different type...
Julio C. Martínez, Photios G. Ioannou
167
Voted
ATAL
2010
Springer
15 years 5 months ago
Narrative generation through characters' point of view
Virtual Actors are at the heart of Interactive Storytelling systems and in recent years multiple approaches have been described to specify their autonomous behaviour. One well kno...
Julie Porteous, Marc Cavazza, Fred Charles
HPDC
2010
IEEE
15 years 5 months ago
Exploring application and infrastructure adaptation on hybrid grid-cloud infrastructure
Clouds are emerging as an important class of distributed computational resources and are quickly becoming an integral part of production computational infrastructures. An importan...
Hyunjoo Kim, Yaakoub El Khamra, Shantenu Jha, Mani...
« Prev « First page 1326 / 1430 Last » Next »