Sciweavers

817 search results - page 145 / 164
» Malware behaviour analysis
Sort
View
USS
2008
13 years 9 months ago
Practical Symmetric Key Cryptography on Modern Graphics Hardware
Graphics processors are continuing their trend of vastly outperforming CPUs while becoming more general purpose. The latest generation of graphics processors have introduced the a...
Owen Harrison, John Waldron
ATAL
2008
Springer
13 years 9 months ago
Agent-based simulation of the spatial dynamics of crime: on the interplay between criminal hot spots and reputation
An important challenge within the field of Criminology is to investigate the spatio-temporal dynamics of crime. Typical questions in this area are how the behaviour of offenders, ...
Tibor Bosse, Charlotte Gerritsen
IADIS
2008
13 years 8 months ago
Data Mining In Non-Stationary Multidimensional Time Series Using A Rule Similarity Measure
Time series analysis is a wide area of knowledge that studies processes in their evolution. The classical research in the area tends to find global laws underlying the behaviour o...
Nikolay V. Filipenkov
ICMLA
2007
13 years 8 months ago
Soft Failure Detection Using Factorial Hidden Markov Models
In modern business, educational, and other settings, it is common to provide a digital network that interconnects hardware devices for shared access by the users (e.g., in an ofï¬...
Guillaume Bouchard, Jean-Marc Andreoli
SDM
2008
SIAM
157views Data Mining» more  SDM 2008»
13 years 8 months ago
ROC-tree: A Novel Decision Tree Induction Algorithm Based on Receiver Operating Characteristics to Classify Gene Expression Data
Gene expression information from microarray experiments is a primary form of data for biological analysis and can offer insights into disease processes and cellular behaviour. Suc...
M. Maruf Hossain, Md. Rafiul Hassan, James Bailey