Sciweavers

250 search results - page 50 / 50
» Using information fragments to answer the questions develope...
Sort
View
ISW
2007
Springer
13 years 10 months ago
Detecting System Emulators
Malware analysis is the process of determining the behavior and purpose of a given malware sample (such as a virus, worm, or Trojan horse). This process is a necessary step to be a...
Thomas Raffetseder, Christopher Krügel, Engin...
SAS
2001
Springer
166views Formal Methods» more  SAS 2001»
13 years 9 months ago
Estimating the Impact of Scalable Pointer Analysis on Optimization
This paper addresses the following question: Do scalable control-flow-insensitive pointer analyses provide the level of precision required to make them useful in compiler optimiza...
Manuvir Das, Ben Liblit, Manuel Fähndrich, Ja...
LREC
2010
213views Education» more  LREC 2010»
13 years 6 months ago
Extensive Evaluation of a FrameNet-WordNet mapping resource
Lexical resources are basic components of many text processing system devoted to information extraction, question answering or dialogue. In paste years many resources have been de...
Diego De Cao, Danilo Croce, Roberto Basili
BMCBI
2005
113views more  BMCBI 2005»
13 years 4 months ago
Systematic survey reveals general applicability of "guilt-by-association" within gene coexpression networks
Background: Biological processes are carried out by coordinated modules of interacting molecules. As clustering methods demonstrate that genes with similar expression display incr...
Cecily J. Wolfe, Isaac S. Kohane, Atul J. Butte
SIGSOFT
2003
ACM
13 years 10 months ago
Modeling and validation of service-oriented architectures: application vs. style
Most applications developed today rely on a given middleware platform which governs the interaction between components, the access to resources, etc. To decide, which platform is ...
Luciano Baresi, Reiko Heckel, Sebastian Thöne...