Sciweavers

2947 search results - page 526 / 590
» Analyzing Program Analyses
Sort
View
ISI
2007
Springer
14 years 11 months ago
Host Based Intrusion Detection using Machine Learning
—Detecting unknown malicious code (malcode) is a challenging task. Current common solutions, such as anti-virus tools, rely heavily on prior explicit knowledge of specific instan...
Robert Moskovitch, Shay Pluderman, Ido Gus, Dima S...
JASIS
2007
119views more  JASIS 2007»
14 years 11 months ago
Visualization of the citation impact environments of scientific journals: An online mapping exercise
Aggregated journal-journal citation networks based on the Journal Citation Reports 2004 of the Science Citation Index (5968 journals) and the Social Science Citation Index (1712 j...
Loet Leydesdorff
JIB
2007
119views more  JIB 2007»
14 years 11 months ago
VINEdb: a data warehouse for integration and interactive exploration of life science data
Control of cell proliferation, differentiation, activation and cell removal is crucial for the development and existence of multi-cellular organisms. Apoptosis, or programmed cell...
Sridhar Hariharaputran, Thoralf Töpel, Bj&oum...
CCR
2004
151views more  CCR 2004»
14 years 11 months ago
Practical verification techniques for wide-area routing
Protocol and system designers use verification techniques to analyze a system's correctness properties. Network operators need verification techniques to ensure the "cor...
Nick Feamster
CCR
2002
72views more  CCR 2002»
14 years 11 months ago
Multicast Video-on-Demand services
The server's storage I/O and network I/O bandwidths are the main bottleneck of VoD service. Multicast offers an efficient means of distributing a video program to multiple cl...
Huadong Ma, Kang G. Shin