Sciweavers

2560 search results - page 411 / 512
» Analysis Tool for Honeypot Systems
Sort
View
SIGIR
2008
ACM
15 years 1 months ago
Social tag prediction
In this paper, we look at the "social tag prediction" problem. Given a set of objects, and a set of tags applied to those objects by users, can we predict whether a give...
Paul Heymann, Daniel Ramage, Hector Garcia-Molina
JWSR
2007
114views more  JWSR 2007»
15 years 1 months ago
Development of Distance Measures for Process Mining, Discovery and Integration
: Business processes continue to play an important role in today’s service-oriented enterprise computing systems. Mining, discovering, and integrating process-oriented services h...
Joonsoo Bae, Ling Liu, James Caverlee, Liang-Jie Z...
RAID
2010
Springer
15 years 5 days ago
Automatic Discovery of Parasitic Malware
Malicious software includes functionality designed to block discovery or analysis by defensive utilities. To prevent correct attribution of undesirable behaviors to the malware, it...
Abhinav Srivastava, Jonathon T. Giffin
CG
2011
Springer
14 years 8 months ago
Multiresolutions numerically from subdivisions
In previous work we introduced a construction to produce multiresolutions from given subdivisions. A portion of that construction required solving bilinear equations using a symbo...
Richard H. Bartels, Faramarz Samavati
132
Voted
TII
2010
113views Education» more  TII 2010»
14 years 8 months ago
An Automated Framework for Formal Verification of Timed Continuous Petri Nets
In this paper, we develop an automated framework for formal verification of timed continuous Petri nets (ContPNs). Specifically, we consider two problems: (1) given an initial set ...
Marius Kloetzer, Cristian Mahulea, Calin Belta, Ma...