Sciweavers

6153 search results - page 1197 / 1231
» Modeling Cyclic Change
Sort
View
DIMVA
2008
13 years 9 months ago
Embedded Malware Detection Using Markov n-Grams
Embedded malware is a recently discovered security threat that allows malcode to be hidden inside a benign file. It has been shown that embedded malware is not detected by commerci...
M. Zubair Shafiq, Syed Ali Khayam, Muddassar Faroo...
EON
2008
13 years 9 months ago
Synthesizing the Mediator with jABC/ABC
Abstract. In this paper we show how to apply a tableau-based software composition technique to automatically generate the mediator's service logic. This uses an LTL planning (...
Tiziana Margaria
ICAI
2008
13 years 9 months ago
Nonrestrictive Concept-Acquisition by Representational Redescription
coarse procedures or very abstract frames from the point of view of algorithm, because some crucial issues like the representation, evolution, storage, and learning process of conc...
Hui Wei, Yan Chen
IFIP8
2007
13 years 9 months ago
Grid-VirtuE: A Layered Architecture for Grid Virtual Enterprises
A grid virtual enterprise is a community of independent enterprises concerned with a particular sector of the economy. Its members (nodes) are small or medium size enterprises (SME...
Alfredo Cuzzocrea, Alessandro D'Atri, Andrea Gualt...
IWIPS
2007
113views Business» more  IWIPS 2007»
13 years 9 months ago
Cross Cultural Study: Perception, Usage, and Adoption of Technology
The primary goal of the project was to understand the cultural similarities and differences in perception, adoption and usage of technology across three cultures (US, India and Ch...
Apala Lahiri Chavan, Beena Prabhu, Warren Greving
« Prev « First page 1197 / 1231 Last » Next »