Sciweavers

117 search results - page 13 / 24
» Intelligent Decision Support for Evaluating and Selecting In...
Sort
View
KDD
2004
ACM
330views Data Mining» more  KDD 2004»
14 years 8 months ago
Learning to detect malicious executables in the wild
In this paper, we describe the development of a fielded application for detecting malicious executables in the wild. We gathered 1971 benign and 1651 malicious executables and enc...
Jeremy Z. Kolter, Marcus A. Maloof
EPIA
2005
Springer
14 years 1 months ago
A Real Time Data Extraction, Transformation and Loading Solution for Semi-structured Text Files
Space applications’ users have been relying for the past decades on custom developed software tools capable of addressing short term necessities during critical Spacecraft contro...
Nuno Viana, Ricardo Raminhos, João Moura Pi...
JCDL
2006
ACM
133views Education» more  JCDL 2006»
14 years 1 months ago
Repository software evaluation using the audit checklist for certification of trusted digital repositories
The NDIIPP ECHO DEPository project [1] digital repository evaluation will use an augmented version of the draft Audit Checklist for Certification of Trusted Digital Repositories (...
Joanne Kaczmarek, Thomas G. Habing, Janet Eke
DIMEA
2008
190views Multimedia» more  DIMEA 2008»
13 years 9 months ago
Bridging the gap between the digital and the physical: design and evaluation of a mobile augmented reality guide for the museum
Can Augmented Reality (AR) techniques inform the design and implementation of a mobile multimedia guide for the museum setting? Drawing from our experience both on previous mobile...
Areti Damala, Pierre Cubaud, Anne Bationo, Pascal ...
DOLAP
2006
ACM
14 years 1 months ago
Designing what-if analysis: towards a methodology
In order to be able to evaluate beforehand the impact of a strategical or tactical move, decision makers need reliable previsional systems. What-if analysis satisfies this need b...
Matteo Golfarelli, Stefano Rizzi, Andrea Proli