Sciweavers

1531 search results - page 223 / 307
» Identifying Topics by Position
Sort
View
ACSAC
2008
IEEE
14 years 2 months ago
Automatic Inference and Enforcement of Kernel Data Structure Invariants
Kernel-level rootkits affect system security by modifying key kernel data structures to achieve a variety of malicious goals. While early rootkits modified control data structur...
Arati Baliga, Vinod Ganapathy, Liviu Iftode
ICDM
2008
IEEE
183views Data Mining» more  ICDM 2008»
14 years 2 months ago
Collaborative Filtering for Implicit Feedback Datasets
A common task of recommender systems is to improve customer experience through personalized recommendations based on prior implicit feedback. These systems passively track differe...
Yifan Hu, Yehuda Koren, Chris Volinsky
CIRA
2007
IEEE
130views Robotics» more  CIRA 2007»
14 years 2 months ago
Compliant Formation Control of a Multi-Vehicle System
— This research identifies a strategy called compliant formation control, which may be used to coordinate the navigational structure of a team of autonomous vehicles. This techni...
Erica Z. MacArthur, Carl D. Crane III
ICC
2007
IEEE
141views Communications» more  ICC 2007»
14 years 2 months ago
A Hybrid Model to Detect Malicious Executables
— We present a hybrid data mining approach to detect malicious executables. In this approach we identify important features of the malicious and benign executables. These feature...
Mohammad M. Masud, Latifur Khan, Bhavani M. Thurai...
ICMB
2007
IEEE
119views Business» more  ICMB 2007»
14 years 2 months ago
Understanding Consumers' Expectations of Mobile Data Services in Australia
The Australian Mobile Telecommunication Industry has experienced a significant growth in the last few years. However, mobile data services which have the potential to increase the...
Sherah Kurnia, Heejin Lee, Song Yang