Sciweavers

950 search results - page 177 / 190
» Developing Law-Governed Systems Using Aspects
Sort
View
IPCCC
2006
IEEE
15 years 3 months ago
Optimising malware
In recent years, malicious software (malware) has become one of the most insidious threats in computer security. However, this is arguably not the result of increased sophisticati...
José M. Fernandez, Pierre-Marc Bureau
MAS
1998
Springer
145views Communications» more  MAS 1998»
15 years 1 months ago
Language Issues in Mobile Program Security
Abstract. Many programming languages have been developed and implemented for mobile code environments. They are typically quite expressive. But while security is an important aspec...
Dennis M. Volpano, Geoffrey Smith
BMCBI
2008
144views more  BMCBI 2008»
14 years 9 months ago
WGCNA: an R package for weighted correlation network analysis
Background: Correlation networks are increasingly being used in bioinformatics applications. For example, weighted gene co-expression network analysis is a systems biology method ...
Peter Langfelder, Steve Horvath
KI
2002
Springer
14 years 9 months ago
Formal Properties of Constraint Calculi for Qualitative Spatial Reasoning
In the previous two decades, a number of qualitative constraint calculi have been developed, which are used to represent and reason about spatial configurations. A common property...
Bernhard Nebel, Alexander Scivos
CCGRID
2008
IEEE
15 years 4 months ago
On the Optimization of Resource Utilization in Distributed Multimedia Applications
—The application and research area of Multimedia Content Analysis (MMCA) considers all aspects of the automated extraction of new knowledge from large multimedia data streams and...
R. Yang, Robert D. van der Mei, D. Roubos, Frank J...