This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
We propose a novel approach for categorizing text documents based on the use of a special kernel. The kernel is an inner product in the feature space generated by all subsequences...
Huma Lodhi, John Shawe-Taylor, Nello Cristianini, ...
LABATCH.2 is a collection of computer programs available in C, FORTRAN, and SIMSCRIPT II.5 by anonymous ftp, at http://www.or.unc.edu/gfish/labatch.2.html. It performs statistical...
Synchronous groupware applications support people collaborating in real time over a distance. The world wide web supports asynchronous collaboration by allowing people to share dis...
The foundation of readiness is training. The Chairman, Joint Chiefs of Staff (CJCS) Joint Training Program institutes methods for identifying training requirements through review ...
Sam H. Parry, Michael C. McAneny, Richard J. Drome...