Sciweavers

555 search results - page 86 / 111
» PST: The Provider Selection Tool
Sort
View
RAID
2010
Springer
13 years 8 months ago
On Challenges in Evaluating Malware Clustering
Malware clustering and classification are important tools that enable analysts to prioritize their malware analysis efforts. The recent emergence of fully automated methods for ma...
Peng Li, Limin Liu, Debin Gao, Michael K. Reiter
SMR
2010
149views more  SMR 2010»
13 years 8 months ago
Capturing variability in business process models: the Provop approach
Usually, for a particular business process different variants exist. Each of them constitutes an adjustment of a reference process model to specific requirements building the proc...
Alena Hallerbach, Thomas Bauer, Manfred Reichert
WCRE
2010
IEEE
13 years 8 months ago
Immediacy through Interactivity: Online Analysis of Run-time Behavior
—Visualizations of actual run-time data support the comprehension of programs, like examples support the ion of abstract concepts and principles. Unfortunately, the required run-...
Michael Perscheid, Bastian Steinert, Robert Hirsch...
ASSETS
2010
ACM
13 years 7 months ago
Towards accessible touch interfaces
Touch screen mobile devices bear the promise of endless leisure, communication, and productivity opportunities to motor-impaired people. Indeed, users with residual capacities in ...
Tiago João Guerreiro, Hugo Nicolau, Joaquim...
COLT
2010
Springer
13 years 7 months ago
Characterization of Linkage-based Clustering
Clustering is a central unsupervised learning task with a wide variety of applications. Not surprisingly, there exist many clustering algorithms. However, unlike classification ta...
Margareta Ackerman, Shai Ben-David, David Loker