Sciweavers

103 search results - page 16 / 21
» Constructing malware normalizers using term rewriting
Sort
View
200
Voted
POPL
2004
ACM
15 years 12 months ago
Parsing expression grammars: a recognition-based syntactic foundation
For decades we have been using Chomsky's generative system of grammars, particularly context-free grammars (CFGs) and regular expressions (REs), to express the syntax of prog...
Bryan Ford
DOLAP
2009
ACM
15 years 6 months ago
A taxonomy of ETL activities
Extract-Transform-Load (ETL) activities are software modules responsible for populating a data warehouse with operational data, which have undergone a series of transformations on...
Panos Vassiliadis, Alkis Simitsis, Eftychia Baikou...
DIGRA
2005
Springer
15 years 5 months ago
Connecting Worlds. Fantasy Role-Playing Games, Ritual Acts and the Magic Circle
From a cultural history and game theoretical perspective my work focuses on the relationship between the fantasy subculture, fantasy role-playing games and the daily life of their...
Marinka Copier
GECCO
2008
Springer
152views Optimization» more  GECCO 2008»
15 years 21 days ago
Combatting financial fraud: a coevolutionary anomaly detection approach
A major difficulty for anomaly detection lies in discovering boundaries between normal and anomalous behavior, due to the deficiency of abnormal samples in the training phase. In...
Shelly Xiaonan Wu, Wolfgang Banzhaf
KDD
2009
ACM
211views Data Mining» more  KDD 2009»
16 years 5 days ago
Address standardization with latent semantic association
Address standardization is a very challenging task in data cleansing. To provide better customer relationship management and business intelligence for customer-oriented cooperates...
Honglei Guo, Huijia Zhu, Zhili Guo, Xiaoxun Zhang,...