Sciweavers

4307 search results - page 372 / 862
» Dynamic Spyware Analysis
Sort
View
IEEEIAS
2007
IEEE
15 years 10 months ago
Cyber Threat Trend Analysis Model Using HMM
Prevention, not reaction, is normally recognized as one of the best defense strategy against malicious hackers or attackers. The desire of deploying better prevention mechanism mo...
Do-Hoon Kim, Taek Lee, Sung-Oh David Jung, Hoh Pet...
CC
2004
Springer
110views System Software» more  CC 2004»
15 years 9 months ago
The Limits of Alias Analysis for Scalar Optimizations
In theory, increasing alias analysis precision should improve compiler optimizations on C programs. This paper compares alias analysis algorithms on scalar optimizations, including...
Rezaul Alam Chowdhury, Peter Djeu, Brendon Cahoon,...
PEPM
1993
ACM
15 years 8 months ago
Binding-Time Analysis and the Taming of C Pointers
The aim of binding-time analysis is to determine when variables, expressions, statements, etc. in a program can be evaluated by classifying these into static (compile-time) and dy...
Lars Ole Andersen
124
Voted
ICCBR
2010
Springer
15 years 7 months ago
Text Adaptation Using Formal Concept Analysis
This paper addresses the issue of adapting cases represented by plain text with the help of formal concept analysis and natural language processing technologies. The actual cases r...
Valmi Dufour-Lussier, Jean Lieber, Emmanuel Nauer,...
ISI
2008
Springer
15 years 4 months ago
Data mining for social network analysis
A social network is defined as a social structure of individuals, who are related (directly or indirectly to each other) based on a common relation of interest, e.g. friendship, t...
J. Srivastava