Sciweavers

173 search results - page 18 / 35
» Ott: effective tool support for the working semanticist
Sort
View
CMS
2010
207views Communications» more  CMS 2010»
13 years 7 months ago
Statistical Detection of Malicious PE-Executables for Fast Offline Analysis
While conventional malware detection approaches increasingly fail, modern heuristic strategies often perform dynamically, which is not possible in many applications due to related ...
Ronny Merkel, Tobias Hoppe, Christian Krätzer...
IWPC
2003
IEEE
14 years 9 hour ago
Scaling an Object-Oriented System Execution Visualizer through Sampling
Increasingly, applications are being built by combining existing software components. For the most part, a software developer can treat components as black-boxes. However, for som...
Andrew Chan, Reid Holmes, Gail C. Murphy, Annie T....
HICSS
2006
IEEE
114views Biometrics» more  HICSS 2006»
14 years 24 days ago
A Preliminary Model for Generating Experience Knowledge Based Artifacts
Inspections provide an effective way of acquiring and reusing experience knowledge. Several details, in both the inspection processes and the inspection event itself, can be found...
Jouni Kokkoniemi
HICSS
2003
IEEE
123views Biometrics» more  HICSS 2003»
14 years 23 hour ago
Structuring Business Models in a Web Representation
In the context of knowledge-intensive work, making the relevant knowledge available to the people needing it for their work is a key issue. One approach is to capture such knowled...
Hermann Kaindl
ACSAC
1998
IEEE
13 years 11 months ago
Concentric Supervision of Security Applications: A New Security Management Paradigm
This paper questions the status quo regarding Security Management (SM) tools that function in an isolated, monolithic fashion. People work best by interacting with others and with...
P. C. Hyland, Ravi S. Sandhu