Sciweavers

1580 search results - page 208 / 316
» Non-Interference Through Determinism
Sort
View
SEC
2008
13 years 11 months ago
Collaborative architecture for malware detection and analysis
The constant increase of malware threats clearly shows that the present countermeasures are not sufficient especially because most actions are put in place only when infections hav...
Michele Colajanni, Daniele Gozzi, Mirco Marchetti
SDM
2007
SIAM
149views Data Mining» more  SDM 2007»
13 years 11 months ago
WAT: Finding Top-K Discords in Time Series Database
Finding discords in time series database is an important problem in a great variety of applications, such as space shuttle telemetry, mechanical industry, biomedicine, and financ...
Yingyi Bu, Oscar Tat-Wing Leung, Ada Wai-Chee Fu, ...
AAAI
2006
13 years 11 months ago
The Complexity of Bribery in Elections
We study the complexity of influencing elections through bribery: How computationally complex is it for an external actor to determine whether by a certain amount of bribing voter...
Piotr Faliszewski, Edith Hemaspaandra, Lane A. Hem...
CSREAESA
2006
13 years 11 months ago
Reliable Management Services for COTS-based Space Systems and Applications
Hybrid spacecraft processing platforms that combine radiation-hardened components with commercialgrade COTS components have the potential to dramatically improve performance while ...
Ian A. Troxel, Eric Grobelny, Grzegorz Cieslewski,...
FLAIRS
2004
13 years 11 months ago
Characterizing Quality of Knowledge on Semantic Web
The Semantic Web is intended for knowledge sharing among agents as well as humans. To achieve this goal, Ontologies, which express knowledge in a certain vitality as well as in a ...
Kaustubh Supekar, Chintan Patel, Yugyung Lee