Sciweavers

922 search results - page 183 / 185
» Attribute based data sharing with attribute revocation
Sort
View
JMLR
2006
132views more  JMLR 2006»
14 years 9 months ago
Learning to Detect and Classify Malicious Executables in the Wild
We describe the use of machine learning and data mining to detect and classify malicious executables as they appear in the wild. We gathered 1,971 benign and 1,651 malicious execu...
Jeremy Z. Kolter, Marcus A. Maloof
75
Voted
NAR
2008
191views more  NAR 2008»
14 years 9 months ago
The BioGRID Interaction Database: 2008 update
The Biological General Repository for Interaction Datasets (BioGRID) database (http://www. thebiogrid.org) was developed to house and distribute collections of protein and genetic...
Bobby-Joe Breitkreutz, Chris Stark, Teresa Reguly,...
SIGMETRICS
2008
ACM
175views Hardware» more  SIGMETRICS 2008»
14 years 9 months ago
DARC: dynamic analysis of root causes of latency distributions
OSprof is a versatile, portable, and efficient profiling methodology based on the analysis of latency distributions. Although OSprof has offers several unique benefits and has bee...
Avishay Traeger, Ivan Deras, Erez Zadok
IJDE
2007
123views more  IJDE 2007»
14 years 9 months ago
Identifying Authorship by Byte-Level N-Grams: The Source Code Author Profile (SCAP) Method
Source code author identification deals with identifying the most likely author of a computer program, given a set of predefined author candidates. There are several scenarios whe...
Georgia Frantzeskou, Efstathios Stamatatos, Stefan...
BMCBI
2005
67views more  BMCBI 2005»
14 years 9 months ago
Sequence signature analysis of chromosome identity in three Drosophila species
Background: All eukaryotic organisms need to distinguish each of their chromosomes. A few protein complexes have been described that recognise entire, specific chromosomes, for in...
Per Stenberg, Fredrik Pettersson, Anja O. Saura, A...