Sciweavers

2705 search results - page 152 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
ACSAC
2006
IEEE
14 years 4 months ago
PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware
Modern malware often hide the malicious portion of their program code by making it appear as data at compiletime and transforming it back into executable code at runtime. This obf...
Paul Royal, Mitch Halpin, David Dagon, Robert Edmo...
SSD
2005
Springer
173views Database» more  SSD 2005»
14 years 3 months ago
On Discovering Moving Clusters in Spatio-temporal Data
A moving cluster is defined by a set of objects that move close to each other for a long time interval. Real-life examples are a group of migrating animals, a convoy of cars movin...
Panos Kalnis, Nikos Mamoulis, Spiridon Bakiras
AIED
2009
Springer
14 years 4 months ago
Using Learning Decomposition to Analyze Instructional Effectiveness in the ASSISTment System
A basic question of instruction is how effective it is in promoting student learning. This paper presents a study determining the relative efficacy of different instructional conte...
Mingyu Feng, Neil T. Heffernan, Joseph E. Beck
AIME
2007
Springer
14 years 4 months ago
Using Semantic Web Technologies for Knowledge-Driven Querying of Biomedical Data
Software applications that work with biomedical data have significant knowledge-management requirements. Formal knowledge models and knowledge-based methods can be very useful in m...
Martin J. O'Connor, Ravi Shankar, Samson W. Tu, Cs...
AAAI
2007
14 years 19 days ago
Relation Extraction from Wikipedia Using Subtree Mining
The exponential growth and reliability of Wikipedia have made it a promising data source for intelligent systems. The first challenge of Wikipedia is to make the encyclopedia mac...
Dat P. T. Nguyen, Yutaka Matsuo, Mitsuru Ishizuka