Sciweavers

212 search results - page 36 / 43
» Hybrid Analysis and Control of Malware
Sort
View
SCP
1998
163views more  SCP 1998»
13 years 10 months ago
Computing with Continuous Change
A central challenge in computer science and knowledge representation is the integration of conceptual frameworks for continuous and discrete change, as exemplified by the theory ...
Vineet Gupta, Radha Jagadeesan, Vijay A. Saraswat
ICRA
2008
IEEE
136views Robotics» more  ICRA 2008»
14 years 4 months ago
Multi-agent probabilistic search in a sequential decision-theoretic framework
— Consider the task of searching a region for the presence or absence of a target using a team of multiple searchers. This paper formulates this search problem as a sequential pr...
Timothy H. Chung, Joel W. Burdick
CHI
2007
ACM
14 years 2 months ago
Command line or pretty lines?: comparing textual and visual interfaces for intrusion detection
Intrusion detection (ID) is one of network security engineers' most important tasks. Textual (command-line) and visual interfaces are two common modalities used to support en...
Ramona Su Thompson, Esa M. Rantanen, William Yurci...
BMCBI
2006
130views more  BMCBI 2006»
13 years 10 months ago
CARMA: A platform for analyzing microarray datasets that incorporate replicate measures
Background: The incorporation of statistical models that account for experimental variability provides a necessary framework for the interpretation of microarray data. A robust ex...
Kevin A. Greer, Matthew R. McReynolds, Heddwen L. ...
RAID
2007
Springer
14 years 4 months ago
Understanding Precision in Host Based Intrusion Detection
Abstract. Many host-based anomaly detection systems monitor process execution at the granularity of system calls. Other recently proposed schemes instead verify the destinations of...
Monirul I. Sharif, Kapil Singh, Jonathon T. Giffin...