Sciweavers

4307 search results - page 367 / 862
» Dynamic Spyware Analysis
Sort
View
AAAI
2012
13 years 6 months ago
Identifying Bullies with a Computer Game
Current computer involvement in adolescent social networks (youth between the ages of 11 and 17) provides new opportunities to study group dynamics, interactions amongst peers, an...
Juan Fernando Mancilla-Caceres, Wen Pu, Eyal Amir,...
CASSIS
2004
Springer
15 years 9 months ago
History-Based Access Control and Secure Information Flow
Abstract. This paper addresses the problem of static checking of programs to ensure that they satisfy confidentiality policies in the presence of dynamic access control in the for...
Anindya Banerjee, David A. Naumann
AUTOMATICA
2006
135views more  AUTOMATICA 2006»
15 years 4 months ago
Finite-time convergent gradient flows with applications to network consensus
This paper introduces the normalized and signed gradient dynamical systems associated with a differentiable function. Extending recent results on nonsmooth stability analysis, we ...
Jorge Cortés
MASSDATA
2007
Springer
15 years 10 months ago
A General Approach to Shape Characterization for Biomedical Problems
Abstract. In this paper, we present a general approach to shape characterization and deformation analysis of 2D/3D deformable visual objects. In particular, we define a reference ...
Davide Moroni, Petra Perner, Ovidio Salvetti
ISMIS
1999
Springer
15 years 8 months ago
Applications and Research Problems of Subgroup Mining
Knowledge Discovery in Databases (KDD) is a data analysis process which, in contrast to conventional data analysis, automatically generates and evaluates very many hypotheses, deal...
Willi Klösgen