Sciweavers

9316 search results - page 79 / 1864
» Analysis of traceback techniques
Sort
View
163
Voted
SIGSOFT
2010
ACM
15 years 1 months ago
Community-based, collaborative testing and analysis
This article proposes a research agenda aimed at enabling optimized testing and analysis processes and tools to support component-based software development communities. We hypoth...
Atif M. Memon, Adam A. Porter, Alan Sussman
153
Voted
WIDM
2012
ACM
13 years 11 months ago
Replaying history on process models for conformance checking and performance analysis
Process mining techniques use event data to discover process models, to check the conformance of predefined process models, and to extend such models with information about bottl...
Wil M. P. van der Aalst, Arya Adriansyah, Boudewij...
134
Voted
INFOCOM
2012
IEEE
13 years 6 months ago
Stochastic analysis of horizontal IP scanning
—Intrusion Detection Systems (IDS) have become ubiquitous in the defense against virus outbreaks, malicious exploits of OS vulnerabilities, and botnet proliferation. As attackers...
Derek Leonard, Zhongmei Yao, Xiaoming Wang, Dmitri...
124
Voted
SICHERHEIT
2010
15 years 1 months ago
A Malware Instruction Set for Behavior-Based Analysis
We introduce a new representation for monitored behavior of malicious software called Malware Instruction Set (MIST). The representation is optimized for effective and efficient a...
Philipp Trinius, Carsten Willems, Thorsten Holz, K...
136
Voted
ICWSM
2009
15 years 1 months ago
Delta TFIDF: An Improved Feature Space for Sentiment Analysis
Mining opinions and sentiment from social networking sites is a popular application for social media systems. Common approaches use a machine learning system with a bag of words f...
Justin Martineau, Tim Finin