Sciweavers

1804 search results - page 264 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
AWIC
2011
Springer
13 years 17 days ago
Enabling Product Comparisons on Unstructured Information Using Ontology Matching
Information extraction approaches are heavily used to gather product information on the Web, especially focusing on technical product specifications. If requesting different sour...
Maximilian Walther, Niels Jäckel, Daniel Schu...
JCS
2011
138views more  JCS 2011»
12 years 12 months ago
Automatic analysis of malware behavior using machine learning
Malicious software—so called malware—poses a major threat to the security of computer systems. The amount and diversity of its variants render classic security defenses ineffe...
Konrad Rieck, Philipp Trinius, Carsten Willems, Th...
SIGMOD
2007
ACM
164views Database» more  SIGMOD 2007»
14 years 9 months ago
Fast data stream algorithms using associative memories
The primary goal of data stream research is to develop space and time efficient solutions for answering continuous online summarization queries. Research efforts over the last dec...
Nagender Bandi, Ahmed Metwally, Divyakant Agrawal,...
IEEEPACT
2008
IEEE
14 years 3 months ago
Meeting points: using thread criticality to adapt multicore hardware to parallel regions
We present a novel mechanism, called meeting point thread characterization, to dynamically detect critical threads in a parallel region. We define the critical thread the one with...
Qiong Cai, José González, Ryan Rakvi...
BMCBI
2006
186views more  BMCBI 2006»
13 years 9 months ago
Systematic gene function prediction from gene expression data by using a fuzzy nearest-cluster method
Background: Quantitative simultaneous monitoring of the expression levels of thousands of genes under various experimental conditions is now possible using microarray experiments....
Xiaoli Li, Yin-Chet Tan, See-Kiong Ng