Sciweavers

42388 search results - page 8058 / 8478
» Classification Using Information
Sort
View
GECCO
2009
Springer
138views Optimization» more  GECCO 2009»
15 years 11 months ago
IMAD: in-execution malware analysis and detection
The sophistication of computer malware is becoming a serious threat to the information technology infrastructure, which is the backbone of modern e-commerce systems. We, therefore...
Syed Bilal Mehdi, Ajay Kumar Tanwani, Muddassar Fa...
IFIP
2009
Springer
15 years 11 months ago
Trusted Multiplexing of Cryptographic Protocols
Abstract. We present an analysis that determines when it is possible to multiplex a pair of cryptographic protocols. We present a transformation that improves the coverage of this ...
Jay A. McCarthy, Shriram Krishnamurthi
IWANN
2009
Springer
15 years 11 months ago
Identifying Gene Ontology Areas for Automated Enrichment
Biomedical ontologies provide a commonly accepted scheme for the characterization of biological concepts that enable knowledge sharing and integration. Updating and maintaining an ...
Catia Pesquita, Tiago Grego, Francisco M. Couto
PRIMA
2009
Springer
15 years 11 months ago
Designing Protocols for Collaborative Translation
Abstract. In this paper, we present a protocol for collaborative translation, where two non-bilingual people who use different languages collaborate to perform the task of transla...
Daisuke Morita, Toru Ishida
SAGT
2009
Springer
136views Game Theory» more  SAGT 2009»
15 years 11 months ago
Non-clairvoyant Scheduling Games
In a scheduling game, each player owns a job and chooses a machine to execute it. While the social cost is the maximal load over all machines (makespan), the cost (disutility) of ...
Christoph Dürr, Nguyen Kim Thang
« Prev « First page 8058 / 8478 Last » Next »