Sciweavers

29 search results - page 6 / 6
» Learning to Detect and Classify Malicious Executables in the...
Sort
View
FC
2005
Springer
149views Cryptology» more  FC 2005»
13 years 10 months ago
Ciphire Mail Email Encryption and Authentication
Abstract. Ciphire Mail is cryptographic software that provides email encryption and digital signatures. The Ciphire Mail client resides on the user's computer between the emai...
Lars Eilebrecht
VISUALIZATION
2003
IEEE
13 years 10 months ago
A Visual Exploration Process for the Analysis of Internet Routing Data
The Internet pervades many aspects of our lives and is becoming indispensable to critical functions in areas such as commerce, government, production and general information disse...
Soon Tee Teoh, Kwan-Liu Ma, Shyhtsun Felix Wu
SIGSOFT
2008
ACM
14 years 5 months ago
Finding programming errors earlier by evaluating runtime monitors ahead-of-time
Runtime monitoring allows programmers to validate, for instance, the proper use of application interfaces. Given a property specification, a runtime monitor tracks appropriate run...
Eric Bodden, Patrick Lam, Laurie J. Hendren
IFIP12
2009
13 years 2 months ago
An Expert System Based on Parametric Net to Support Motor Pump Multi-Failure Diagnostic
Abstract Early failure detection in motor pumps is an important issue in prediction maintenance. An efficient condition-monitoring scheme is capable of providing warning and predic...
Flavia Cristina Bernardini, Ana Cristina Bicharra ...