Sciweavers

1061 search results - page 157 / 213
» A general definition of malware
Sort
View
CORR
2010
Springer
138views Education» more  CORR 2010»
14 years 12 months ago
Data Stream Clustering: Challenges and Issues
Very large databases are required to store massive amounts of data that are continuously inserted and queried. Analyzing huge data sets and extracting valuable pattern in many appl...
Madjid Khalilian, Norwati Mustapha
CORR
2008
Springer
118views Education» more  CORR 2008»
14 years 12 months ago
Correlated Equilibria in Continuous Games: Characterization and Computation
We present several new characterizations of correlated equilibria in games with continuous utility functions. These have the advantage of being more computationally and analytical...
Noah D. Stein, Pablo A. Parrilo, Asuman E. Ozdagla...
AO
2006
128views more  AO 2006»
14 years 12 months ago
Towards ontologies for formalizing modularization and communication in large software systems
Large software systems are modularized in order to improve manageability. The parts of the software system communicate in order to achieve the desired functionality. To better und...
Daniel Oberle, Steffen Lamparter, Stephan Grimm, D...
DSONLINE
2006
79views more  DSONLINE 2006»
14 years 12 months ago
Integrating Security Policies via Container Portable Interceptors
In the past, it was very common to develop middleware without consideration of security from the very beginning. To integrate security, the middleware that should be protected has...
Tom Ritter, Rudolf Schreiner, Ulrich Lang
IJSI
2008
129views more  IJSI 2008»
14 years 12 months ago
Managing the Acronym/Expansion Identification Process for Text-Mining Applications
This paper deals with an acronym/definition extraction approach from textual data (corpora) and the disambiguation of these definitions (or expansions). Both steps of our global pr...
Mathieu Roche, Violaine Prince