Sciweavers

22698 search results - page 4521 / 4540
» Modeling in Software Engineering
Sort
View
DIMVA
2008
13 years 8 months ago
Embedded Malware Detection Using Markov n-Grams
Embedded malware is a recently discovered security threat that allows malcode to be hidden inside a benign file. It has been shown that embedded malware is not detected by commerci...
M. Zubair Shafiq, Syed Ali Khayam, Muddassar Faroo...
EON
2008
13 years 8 months ago
Synthesizing the Mediator with jABC/ABC
Abstract. In this paper we show how to apply a tableau-based software composition technique to automatically generate the mediator's service logic. This uses an LTL planning (...
Tiziana Margaria
MKWI
2008
135views Business» more  MKWI 2008»
13 years 8 months ago
Ontology-based process mediation in the European project BRITE
: Service-oriented architectures (SOA) are recent architectures enabling interoperable machine-to-machine process interaction by generating a comprehensive view of independent soft...
Ansgar Mondorf, Timo Herborn
DAGSTUHL
2006
13 years 8 months ago
Point-set algorithms for pattern discovery and pattern matching in music
An algorithm that discovers the themes, motives and other perceptually significant repeated patterns in a musical work can be used, for example, in a music information retrieval sy...
David Meredith
DMIN
2006
124views Data Mining» more  DMIN 2006»
13 years 8 months ago
Use of Multivariate Data Analysis for Lumber Drying Process Monitoring and Fault Detection
Process monitoring refers to the task of detecting abnormal process operations resulting from the shift in the mean and/or the variance of one or more process variables. To success...
Mouloud Amazouz, Radu Pantea
« Prev « First page 4521 / 4540 Last » Next »