Sciweavers

926 search results - page 171 / 186
» An Approach for Extracting Workflows from E-Commerce Applica...
Sort
View
109
Voted
CCS
2008
ACM
15 years 1 months ago
Ether: malware analysis via hardware virtualization extensions
Malware has become the centerpiece of most security threats on the Internet. Malware analysis is an essential technology that extracts the runtime behavior of malware, and supplie...
Artem Dinaburg, Paul Royal, Monirul I. Sharif, Wen...
PERVASIVE
2010
Springer
15 years 1 months ago
Specification and Verification of Complex Location Events with Panoramic
We present the design and evaluation of Panoramic, a tool that enables end-users to specify and verify an important family of complex location events. Our approach aims to reduce o...
Evan Welbourne, Magdalena Balazinska, Gaetano Borr...
ICCBR
2010
Springer
14 years 9 months ago
Taxonomic Semantic Indexing for Textual Case-Based Reasoning
Abstract. Case-Based Reasoning (CBR) solves problems by reusing past problemsolving experiences maintained in a casebase. The key CBR knowledge container therefore is its casebase....
Juan A. Recio-García, Nirmalie Wiratunga
DSS
2006
138views more  DSS 2006»
14 years 11 months ago
Design of a shopbot and recommender system for bundle purchases
The increasing proliferation of online shopping and purchasing has naturally led to a growth in the popularity of comparisonshopping search engines, popularly known as "shopb...
Robert S. Garfinkel, Ram D. Gopal, Arvind K. Tripa...
VIROLOGY
2010
179views more  VIROLOGY 2010»
14 years 10 months ago
Automatic binary deobfuscation
Abstract. This paper gives an overview of our research in the automation of the process of software protection analysis. We will focus more particularly on the problem of obfuscati...
Yoann Guillot, Alexandre Gazet