Sciweavers

4307 search results - page 398 / 862
» Dynamic Spyware Analysis
Sort
View
CDC
2008
IEEE
198views Control Systems» more  CDC 2008»
15 years 11 months ago
Performance analysis of different routing protocols in Wireless Sensor Networks for real-time estimation
— In this paper we analyze the performance of two different routing protocols specifically designed for Wireless Sensor Networks (WSNs) for real-time estimation, control, and mo...
Damiano Varagnolo, Phoebus Chen, Luca Schenato, Sh...
HICSS
2008
IEEE
136views Biometrics» more  HICSS 2008»
15 years 11 months ago
Tag Clouds: Data Analysis Tool or Social Signaller?
We examine the recent information visualization phenomenon known as tag clouds, which are an interesting combination of data visualization, web design element, and social marker. ...
Marti A. Hearst, Daniela Karin Rosner
ICPR
2008
IEEE
15 years 11 months ago
Adaptive nonstationary regression analysis
The problem of finding the most appropriate subset of features or regressors is the generic challenge of Machine Learning problems like regression estimation or pattern recognitio...
Olga Krasotkina, Vadim Mottl
ACSAC
2007
IEEE
15 years 10 months ago
Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Injection
With the recent rapid increase in interactive web applications that employ back-end database services, an SQL injection attack has become one of the most serious security threats....
Yuji Kosuga, Kenji Kono, Miyuki Hanaoka, Miho Hish...
BROADNETS
2007
IEEE
15 years 10 months ago
Modeling and analysis of worm interactions (war of the worms)
—“War of the worms” is a war between opposing computer worms, creating complex worm interactions as well as detrimental impact on infrastructure. For example, in September 20...
Sapon Tanachaiwiwat, Ahmed Helmy