In this paper, we describe the development of a fielded application for detecting malicious executables in the wild. We gathered 1971 benign and 1651 malicious executables and enc...
Government regulations are semi-structured text documents that are often voluminous, heavily cross-referenced between provisions and even ambiguous. Multiple sources of regulation...
Non-uniform utilization of functional units in combination with hardware mechanisms such as clock gating leads to different power consumptions in different parts of a processor ch...
Knowledge workers expend considerable effort managing fragmentation, characterized by constant switching among digital artifacts, when executing work activities. Activitycentric c...
Aruna D. Balakrishnan, Tara Matthews, Thomas P. Mo...
Rule bases are increasingly being used as repositories of knowledge content on the Semantic Web. As the size and complexity of these rule bases s, developers and end users need met...