Sciweavers

482 search results - page 56 / 97
» A taxonomy of computer worms
Sort
View
98
Voted
EDBT
2008
ACM
160views Database» more  EDBT 2008»
15 years 2 months ago
Taxonomy-superimposed graph mining
New graph structures where node labels are members of hierarchically organized ontologies or taxonomies have become commonplace in different domains, e.g., life sciences. It is a ...
Ali Cakmak, Gultekin Özsoyoglu
108
Voted
CHI
2008
ACM
16 years 26 days ago
Talc: using desktop graffiti to fight software vulnerability
With the proliferation of computer security threats on the Internet, especially threats such as worms that automatically exploit software flaws, it is becoming more and more impor...
Kandha Sankarpandian, Travis Little, W. Keith Edwa...
ANSOFT
1998
157views more  ANSOFT 1998»
15 years 5 days ago
Software Engineering Programmes are not Computer Science Programmes
Programmes in “Software Engineering” have become a source of contention in many universities. Computer Science departments, many of which have used that phrase to describe ind...
David Lorge Parnas
118
Voted
AFRIGRAPH
2007
ACM
15 years 4 months ago
Generic computation of bulletin boards into geometric kernels
Nowadays, many commercial CAD systems are built on proprietary geometric kernels which provide an API containing a set of high level geometric operations (boolean operations, slot...
Mehdi Baba-ali, David Marcheix, Xavier Skapin, Yve...
81
Voted
NSPW
2006
ACM
15 years 6 months ago
Cent, five cent, ten cent, dollar: hitting botnets where it really hurts
Spyware, Adware, Bots. In each case, there is significant evidence that there is an increasing financial motivation behind the writing and distribution of these programs. In thi...
Richard Ford, Sarah Gordon