Sciweavers

1009 search results - page 65 / 202
» Performance Analysis of UML Models Using Aspect-Oriented Mod...
Sort
View
165
Voted
CCS
2010
ACM
15 years 3 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
ACSAC
2002
IEEE
15 years 8 months ago
Composable Tools For Network Discovery and Security Analysis
Security analysis should take advantage of a reliable knowledge base that contains semantically-rich information about a protected network. This knowledge is provided by network m...
Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richa...
145
Voted
CSDA
2008
128views more  CSDA 2008»
15 years 3 months ago
Classification tree analysis using TARGET
Tree models are valuable tools for predictive modeling and data mining. Traditional tree-growing methodologies such as CART are known to suffer from problems including greediness,...
J. Brian Gray, Guangzhe Fan
137
Voted
CASCON
1996
89views Education» more  CASCON 1996»
15 years 4 months ago
A comparison of algorithms for interprocedural class analysis
Message passing overhead is often a substantial source of runtime overhead in object-oriented applications. To combat this performance problem, a number of techniques have been de...
David Grove
BIRD
2008
Springer
15 years 5 months ago
Efficient Seeding Techniques for Protein Similarity Search
Abstract. We apply the concept of subset seeds proposed in [1] to similarity search in protein sequences. The main question studied is the design of efficient seed alphabets to con...
Mikhail A. Roytberg, Anna Gambin, Laurent No&eacut...