Sciweavers

506 search results - page 58 / 102
» Network Engineering for Complex Belief Networks
Sort
View
COMPLEX
2009
Springer
14 years 3 months ago
Toward Automatic Discovery of Malware Signature for Anti-Virus Cloud Computing
Security vendors are facing a serious problem of defeating the complexity of malwares. With the popularity and the variety of zeroday malware over the Internet, generating their si...
Wei Yan, Erik Wu
CMMR
2007
Springer
140views Music» more  CMMR 2007»
14 years 2 months ago
Emergent Rhythms through Multi-agency in Max/MSP
This paper presents a multiple-agent architecture created in Max/ MSP that generates polyphonic rhythmic patterns which continuously evolve and develop in a musically intelligent m...
Arne Eigenfeldt
WWW
2011
ACM
13 years 3 months ago
Pragmatic evaluation of folksonomies
Recently, a number of algorithms have been proposed to obtain hierarchical structures — so-called folksonomies — from social tagging data. Work on these algorithms is in part ...
Denis Helic, Markus Strohmaier, Christoph Trattner...
GIR
2006
ACM
14 years 2 months ago
Range-capable Distributed Hash Tables
In this paper, we present a novel indexing data structure called RDHT (Range capable Distributed Hash Table) derived from skip lists and specifically designed for storing and retr...
Alessandro Soro, Cristian Lai
SIGSOFT
2000
ACM
14 years 1 months ago
Bugs in the programs
Fuzzing is a well-known black-box approach to the security testing of applications. Fuzzing has many advantages in terms of simplicity and effectiveness over more complex, expensi...
Richard D. Pethia