Sciweavers

2826 search results - page 184 / 566
» A resource-based analysis of IT sourcing
Sort
View
APSEC
2008
IEEE
15 years 8 months ago
Test Case Prioritization Based on Analysis of Program Structure
Test case prioritization techniques have been empirically proved to be effective in improving the rate of fault detection in regression testing. However, most of previous techniqu...
Zengkai Ma, Jianjun Zhao
GLOBECOM
2008
IEEE
15 years 8 months ago
Support Vector Machines and Random Forests Modeling for Spam Senders Behavior Analysis
— Unwanted and malicious messages dominate Email traffic and pose a great threat to the utility of email communications. Reputation systems have been getting momentum as the sol...
Yuchun Tang, Sven Krasser, Yuanchen He, Weilai Yan...
IEEEARES
2008
IEEE
15 years 8 months ago
Towards Comprehensive Requirement Analysis for Data Warehouses: Considering Security Requirements
—Data warehouse (DW) systems integrate data from heterogeneous sources and are used by decision makers to analyze the status and the development of an organization. Traditionally...
Emilio Soler, Veronika Stefanov, Jose-Norberto Maz...
ITNG
2008
IEEE
15 years 8 months ago
GlycoVault: A Bioinformatics Infrastructure for Glycan Pathway Visualization, Analysis and Modeling
Glycan biosynthesis is the process by which glycans are built in the cells. Information about the process is available from several Web accessible databases, published papers, exp...
Shravya Nimmagadda, Amrita Basu, Matthew Eavenson,...
NDSS
2008
IEEE
15 years 8 months ago
Impeding Malware Analysis Using Conditional Code Obfuscation
Malware programs that incorporate trigger-based behavior initiate malicious activities based on conditions satisfied only by specific inputs. State-of-the-art malware analyzers ...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...