Sciweavers

9316 search results - page 79 / 1864
» Analysis of traceback techniques
Sort
View
SIGSOFT
2010
ACM
14 years 9 months ago
Community-based, collaborative testing and analysis
This article proposes a research agenda aimed at enabling optimized testing and analysis processes and tools to support component-based software development communities. We hypoth...
Atif M. Memon, Adam A. Porter, Alan Sussman
WIDM
2012
ACM
13 years 7 months ago
Replaying history on process models for conformance checking and performance analysis
Process mining techniques use event data to discover process models, to check the conformance of predefined process models, and to extend such models with information about bottl...
Wil M. P. van der Aalst, Arya Adriansyah, Boudewij...
INFOCOM
2012
IEEE
13 years 2 months ago
Stochastic analysis of horizontal IP scanning
—Intrusion Detection Systems (IDS) have become ubiquitous in the defense against virus outbreaks, malicious exploits of OS vulnerabilities, and botnet proliferation. As attackers...
Derek Leonard, Zhongmei Yao, Xiaoming Wang, Dmitri...
SICHERHEIT
2010
14 years 9 months ago
A Malware Instruction Set for Behavior-Based Analysis
We introduce a new representation for monitored behavior of malicious software called Malware Instruction Set (MIST). The representation is optimized for effective and efficient a...
Philipp Trinius, Carsten Willems, Thorsten Holz, K...
ICWSM
2009
14 years 9 months ago
Delta TFIDF: An Improved Feature Space for Sentiment Analysis
Mining opinions and sentiment from social networking sites is a popular application for social media systems. Common approaches use a machine learning system with a bag of words f...
Justin Martineau, Tim Finin