Sciweavers

1370 search results - page 187 / 274
» Metacase Tools for Multidimensional Development of Informati...
Sort
View
ISW
2007
Springer
14 years 3 months ago
Detecting System Emulators
Malware analysis is the process of determining the behavior and purpose of a given malware sample (such as a virus, worm, or Trojan horse). This process is a necessary step to be a...
Thomas Raffetseder, Christopher Krügel, Engin...
KAIS
2006
247views more  KAIS 2006»
13 years 8 months ago
XCQ: A queriable XML compression system
XML has already become the de facto standard for specifying and exchanging data on the Web. However, XML is by nature verbose and thus XML documents are usually large in size, a fa...
Wilfred Ng, Wai Yeung Lam, Peter T. Wood, Mark Lev...
JCDL
2009
ACM
150views Education» more  JCDL 2009»
14 years 1 months ago
Science teachers' use of online resources and the digital library for Earth system education
A three-part study of teachers’ use of online resources and of the Digital Library for Earth System Education (DLESE) was conducted from 2004 through summer 2006. The first two ...
Lecia Jane Barker
CN
1999
128views more  CN 1999»
13 years 8 months ago
Intrusion detection systems as evidence
: Although the main aim of IDSs is to detect intrusions to prompt evasive measures, a further aim can be to supply evidence in criminal and civil legal proceedings. However the fea...
Peter Sommer
WICSA
2001
13 years 10 months ago
A Highly-Extensible, XML-Based Architecture Description Language
Software architecture research focuses on models of software architectures as specified in architecture description languages (ADLs). As research progresses in specific areas of s...
Eric M. Dashofy, André van der Hoek, Richar...