Sciweavers

1791 search results - page 310 / 359
» Behavioral Operations
Sort
View
CCS
2008
ACM
15 years 1 months ago
Ether: malware analysis via hardware virtualization extensions
Malware has become the centerpiece of most security threats on the Internet. Malware analysis is an essential technology that extracts the runtime behavior of malware, and supplie...
Artem Dinaburg, Paul Royal, Monirul I. Sharif, Wen...
SDM
2007
SIAM
96views Data Mining» more  SDM 2007»
15 years 1 months ago
Understanding and Utilizing the Hierarchy of Abnormal BGP Events
Abnormal events, such as security attacks, misconfigurations, or electricity failures, could have severe consequences toward the normal operation of the Border Gateway Protocol (...
Dejing Dou, Jun Li, Han Qin, Shiwoong Kim, Sheng Z...
AIPS
2003
15 years 1 months ago
A Multi-Agent System-driven AI Planning Approach to Biological Pathway Discovery
As genomic and proteomic data is collected from highthroughput methods on a daily basis, subcellular components are identified and their in vitro behavior is characterized. Howev...
Salim Khan, William Gillis, Carl Schmidt, Keith De...
FAST
2003
15 years 1 months ago
Semantically-Smart Disk Systems
We propose and evaluate the concept of a semantically-smart disk system (SDS). As opposed to a traditional “smart” disk, an SDS has detailed knowledge of how the file system ...
Muthian Sivathanu, Vijayan Prabhakaran, Florentina...
GECCO
2008
Springer
143views Optimization» more  GECCO 2008»
15 years 27 days ago
Application domain study of evolutionary algorithms in optimization problems
This paper deals with the problem of comparing and testing evolutionary algorithms, that is, the benchmarking problem, from an analysis point of view. A practical study of the app...
Pilar Caamaño, Francisco Bellas, José...