Sciweavers

323 search results - page 30 / 65
» A Comparison of Different Conceptual Structures Projection A...
Sort
View
AUSDM
2008
Springer
225views Data Mining» more  AUSDM 2008»
14 years 11 months ago
Evaluation of Malware clustering based on its dynamic behaviour
Malware detection is an important problem today. New malware appears every day and in order to be able to detect it, it is important to recognize families of existing malware. Dat...
Ibai Gurrutxaga, Olatz Arbelaitz, Jesús M. ...
CORR
2010
Springer
85views Education» more  CORR 2010»
14 years 9 months ago
Generic design of Chinese remaindering schemes
We propose a generic design for Chinese remainder algorithms. A Chinese remainder computation consists in reconstructing an integer value from its residues modulo non coprime inte...
Jean-Guillaume Dumas, Thierry Gautier, Jean-Louis ...
CAISE
2003
Springer
15 years 2 months ago
Goal-Oriented Requirements Engineering: A Case Study in E-government
This paper presents a requirements engineering framework based on the notions of Actor, Goal, and Intentional Dependency, and applies it to a case study in the field of Informatio...
Paolo Donzelli, Paolo Bresciani
96
Voted
RTSS
2008
IEEE
15 years 4 months ago
A Holistic Approach to Decentralized Structural Damage Localization Using Wireless Sensor Networks
Wireless sensor networks (WSNs) have become an increasingly compelling platform for Structural Health Monitoring (SHM) applications, since they can be installed relatively inexpen...
Gregory Hackmann, Fei Sun, Nestor Castaneda, Cheny...
85
Voted
SIMULATION
2010
178views more  SIMULATION 2010»
14 years 4 months ago
Application-level Simulation for Network Security
We introduce and describe a novel network simulation tool called NeSSi (Network Security Simulator). NeSSi incorporates a variety of features relevant to network security distingu...
Stephan Schmidt, Rainer Bye, Joël Chinnow, Ka...