Sciweavers

8689 search results - page 1714 / 1738
» Software: hard data
Sort
View
DIMVA
2008
13 years 10 months ago
Embedded Malware Detection Using Markov n-Grams
Embedded malware is a recently discovered security threat that allows malcode to be hidden inside a benign file. It has been shown that embedded malware is not detected by commerci...
M. Zubair Shafiq, Syed Ali Khayam, Muddassar Faroo...
MBEES
2008
13 years 10 months ago
Composition of Model-based Test Coverage Criteria
: In this paper, we discuss adjustable coverage criteria and their combinations in model-based testing. We formalize coverage criteria and specify test goals using OCL. Then, we pr...
Mario Friske, Bernd-Holger Schlingloff, Stephan We...
MKWI
2008
135views Business» more  MKWI 2008»
13 years 10 months ago
Ontology-based process mediation in the European project BRITE
: Service-oriented architectures (SOA) are recent architectures enabling interoperable machine-to-machine process interaction by generating a comprehensive view of independent soft...
Ansgar Mondorf, Timo Herborn
AAAI
2006
13 years 10 months ago
The Robot Intelligence Kernel
The Robot Intelligence Kernel (RIK) is a portable, reconfigurable suite of perceptual, behavioral, and cognitive capabilities that can be used across many different platforms, env...
David J. Bruemmer, Douglas A. Few, Miles C. Walton...
DLOG
2006
13 years 10 months ago
Towards Mobile Reasoning
Highly optimized reasoning support for Description Logics (DLs) has been developed during the past years. This paper presents our efforts to develop a reasoner suitable for mobile ...
Thomas Kleemann
« Prev « First page 1714 / 1738 Last » Next »