Sciweavers

8135 search results - page 1356 / 1627
» network 2008
Sort
View
DIMVA
2008
15 years 6 months ago
Learning and Classification of Malware Behavior
Malicious software in form of Internet worms, computer viruses, and Trojan horses poses a major threat to the security of networked systems. The diversity and amount of its variant...
Konrad Rieck, Thorsten Holz, Carsten Willems, Patr...
DMS
2008
106views Multimedia» more  DMS 2008»
15 years 6 months ago
A Multimedia Data Streams Model for Content-based Information Retrieval
: Multimedia applications nowadays are becoming the standard, for they utilize the enormous human brain computational power. In the past, the Relational Database Model was generali...
Shenoda Guirguis, Rohit Kulkarni, Shi-Kuo Chang
EMNLP
2008
15 years 6 months ago
Jointly Combining Implicit Constraints Improves Temporal Ordering
Previous work on ordering events in text has typically focused on local pairwise decisions, ignoring globally inconsistent labels. However, temporal ordering is the type of domain...
Nathanael Chambers, Daniel Jurafsky
FORTE
2008
15 years 6 months ago
An SMT Approach to Bounded Reachability Analysis of Model Programs
Model programs represent transition systems that are used fy expected behavior of systems at a high level of abstraction. The main application area is application-level network pro...
Margus Veanes, Nikolaj Bjørner, Alexander R...
IADIS
2008
15 years 6 months ago
A Case-Based Reasoning System to Forecast the Presence Of Oil Slicks
After an oil spill it is essential to know if an area is going to be affected by the oil slicks generated. The system presented here forecasts the presence or not of oil slicks in...
Juan M. Corchado, Aitor Mata, Juan Francisco de Pa...
« Prev « First page 1356 / 1627 Last » Next »