Sciweavers

1051 search results - page 131 / 211
» Analyzing Resource Behavior Using Process Mining
Sort
View
103
Voted
CCS
2007
ACM
15 years 6 months ago
Panorama: capturing system-wide information flow for malware detection and analysis
Malicious programs spy on users’ behavior and compromise their privacy. Even software from reputable vendors, such as Google Desktop and Sony DRM media player, may perform undes...
Heng Yin, Dawn Xiaodong Song, Manuel Egele, Christ...
124
Voted
CHI
2011
ACM
14 years 4 months ago
No clicks, no problem: using cursor movements to understand and improve search
Understanding how people interact with search engines is important in improving search quality. Web search engines typically analyze queries and clicked results, but these actions...
Jeff Huang, Ryen W. White, Susan T. Dumais
115
Voted
FUIN
2010
136views more  FUIN 2010»
14 years 10 months ago
Modeling Biology using Generic Reactive Animation
Abstract. Complex biological systems involve incorporated behaviors of numerous processes, mechanisms and objects. However, experimental analysis, by its nature, divides biological...
Yaki Setty, Irun R. Cohen, David Harel
110
Voted
ICCCN
2007
IEEE
15 years 7 months ago
Grid Computing on Massively Multi-User Online Platform
—Large-scale online applications such as Massively Multiplayer Online Games (MMOGs) require large amount of computing resources that support many players interacting simultaneous...
Y. C. Allen Yu, Ka Lun Eddie Law
69
Voted
DSN
2005
IEEE
15 years 6 months ago
Detecting Stealth Software with Strider GhostBuster
Stealth malware programs that silently infect enterprise and consumer machines are becoming a major threat to the future of the Internet [XZ04]. Resource hiding is a powerful stea...
Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, C...