Sciweavers

792 search results - page 102 / 159
» Reading What Machines
Sort
View
IAW
2003
IEEE
14 years 2 months ago
The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks
– Computer Networks connected to the Internet continue to be compromised and exploited by hackers. This is in spite of the fact that many networks run some type of security mecha...
John G. Levine, Richard LaBella, Henry L. Owen, Di...
ICSE
2001
IEEE-ACM
14 years 1 months ago
A Framework for Multi-Valued Reasoning over Inconsistent Viewpoints
In requirements elicitation, different stakeholders often hold different views of how a proposed system should behave, resulting in inconsistencies between their descriptions. Con...
Steve M. Easterbrook, Marsha Chechik
IWPC
1999
IEEE
14 years 1 months ago
Recovery of Jump Table Case Statements from Binary Code
One of the fundamental problems with the static analysis of binary (executable) code is that7 of recognizing, in a machine-independent way, the target addresses of n-conditional b...
Cristina Cifuentes, Mike Van Emmerik
ALT
1998
Springer
14 years 1 months ago
Predictive Learning Models for Concept Drift
Concept drift means that the concept about which data is obtained may shift from time to time, each time after some minimum permanence. Except for this minimum permanence, the con...
John Case, Sanjay Jain, Susanne Kaufmann, Arun Sha...
ECTEL
2009
Springer
14 years 27 days ago
Context-Aware Combination of Adapted User Profiles for Interchange of Knowledge between Peers
Abstract. This paper presents a system that connects students with complementary profiles, so they can interchange knowledge and help each other. The profile of the students is bui...
Sergio Gutiérrez Santos, Mario Muñoz...