Sciweavers

2719 search results - page 23 / 544
» Exposing Application Alternatives
Sort
View
CCS
2010
ACM
14 years 10 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
59
Voted
DM
1999
63views more  DM 1999»
14 years 9 months ago
A class of functions and their application in constructing semi-biplanes and association schemes
We give an alternative proof of the fact that a planar function cannot exist on groups of even order. The argument involved leads us to define a class of functions which we
Robert S. Coulter, Marie Henderson
INFORMATICALT
2008
84views more  INFORMATICALT 2008»
14 years 9 months ago
Multi-Criterion Assessment of Preferences for Communication Alternatives of Wind Power Park Information System
Abstract. This paper presents the application of multi-criterion approach to the analysis and comparison of reference alternatives of wind power park information system (WPPIS) whi...
Antanas Nemura, Arturas Klementavicius
74
Voted
KDD
2009
ACM
208views Data Mining» more  KDD 2009»
15 years 10 months ago
A principled and flexible framework for finding alternative clusterings
The aim of data mining is to find novel and actionable insights in data. However, most algorithms typically just find a single (possibly non-novel/actionable) interpretation of th...
Zijie Qi, Ian Davidson
BIBE
2007
IEEE
125views Bioinformatics» more  BIBE 2007»
15 years 4 months ago
Large-scale Discovery of Regulatory Motifs Involved in Alternative Splicing
Alternative splicing is a highly important process in many eukaryotic organisms, but surprisingly little is known about its regulation. Often, this process involves cis-regulatory ...
Sihui Zhao, Jihye Kim, Steffen Heber