Sciweavers

3679 search results - page 659 / 736
» Hybrid Semantic Analysis
Sort
View
99
Voted
ACSAC
2007
IEEE
15 years 7 months ago
MetaAware: Identifying Metamorphic Malware
Detection of malicious software (malware) by the use of static signatures is often criticized for being overly simplistic. Available methods of obfuscating code (so-called metamor...
Qinghua Zhang, Douglas S. Reeves
ICC
2007
IEEE
162views Communications» more  ICC 2007»
15 years 7 months ago
Ontology-Based Reasoning for Supporting Context-Aware Services on Autonomic Networks
- Ontology engineering has been proposed as a formal mechanism for both reducing the complexity of managing the information needed in network management and autonomic systems and f...
Jaime Martín Serrano, Joan Serrat, John Str...
96
Voted
ICDE
2007
IEEE
106views Database» more  ICDE 2007»
15 years 7 months ago
Mining Trajectory Databases via a Suite of Distance Operators
With the rapid progress of mobile devices and positioning technologies, Trajectory Databases (TD) have been in the core of database research during the last decade. Analysis and k...
Nikos Pelekis, Ioannis Kopanakis, Irene Ntoutsi, G...
KBSE
2007
IEEE
15 years 6 months ago
Feature location via information retrieval based filtering of a single scenario execution trace
The paper presents a semi-automated technique for feature location in source code. The technique is based on combining information from two different sources: an execution trace, ...
Dapeng Liu, Andrian Marcus, Denys Poshyvanyk, Vacl...
116
Voted
SEMCO
2007
IEEE
15 years 6 months ago
Perceptual Shape-Based Natural Image Representation and Retrieval
Human visual recognition is based largely on shape, yet effectively using shapes in natural image retrieval is a challenging task. Most existing methods are based on the geometric...
Xiaofen Zheng, Scott A. Sherrill-Mix, Qigang Gao