Sciweavers

20 search results - page 4 / 4
» K-Tracer: A System for Extracting Kernel Malware Behavior
Sort
View
DIMVA
2010
13 years 5 months ago
dAnubis - Dynamic Device Driver Analysis Based on Virtual Machine Introspection
Abstract. In the escalating arms race between malicious code and security tools designed to analyze it, detect it or mitigate its impact, malicious code running inside the operatin...
Matthias Neugschwandtner, Christian Platzer, Paolo...
ICCAD
1997
IEEE
117views Hardware» more  ICCAD 1997»
13 years 9 months ago
Decomposition of timed decision tables and its use in presynthesis optimizations
Presynthesis optimizations transform a behavioral HDL description into an optimized HDL description that results in improved synthesis results. In this paper we introduce the decom...
Jian Li, Rajesh K. Gupta
FSS
2007
102views more  FSS 2007»
13 years 5 months ago
Extraction of fuzzy rules from support vector machines
The relationship between support vector machines (SVMs) and Takagi–Sugeno–Kang (TSK) fuzzy systems is shown. An exact representation of SVMs as TSK fuzzy systems is given for ...
Juan Luis Castro, L. D. Flores-Hidalgo, Carlos Jav...
ICCV
2009
IEEE
14 years 10 months ago
Time Series Prediction by Chaotic Modeling of Nonlinear Dynamical Systems
We use concepts from chaos theory in order to model nonlinear dynamical systems that exhibit deterministic behavior. Observed time series from such a system can be embedded into...
Arslan Basharat, Mubarak Shah
BMCBI
2010
135views more  BMCBI 2010»
13 years 5 months ago
Detecting disease associated modules and prioritizing active genes based on high throughput data
Background: The accumulation of high-throughput data greatly promotes computational investigation of gene function in the context of complex biological systems. However, a biologi...
Yu-Qing Qiu, Shi-Hua Zhang, Xiang-Sun Zhang, Luona...