Sciweavers

16070 search results - page 28 / 3214
» Identifying
Sort
View
162
Voted
SP
2010
IEEE
194views Security Privacy» more  SP 2010»
15 years 7 months ago
Identifying Dormant Functionality in Malware Programs
—To handle the growing flood of malware, security vendors and analysts rely on tools that automatically identify and analyze malicious code. Current systems for automated malwar...
Paolo Milani Comparetti, Guido Salvaneschi, Engin ...
119
Voted
JAVACARD
2000
15 years 7 months ago
Formal Specification and Verification of JavaCard's Application Identifier Class
Abstract This note discusses a verification in PVS of the AID (Application Identifier) class from JavaCard's API. The properties that are verified are formulated in the interf...
Joachim van den Berg, Bart Jacobs, Erik Poll
FECS
2007
199views Education» more  FECS 2007»
15 years 5 months ago
Identifying Neurologic Music Therapy Techniques Amenable to Automation
- Neurologic Music Therapy (NMT) can improve deficiencies in speech, motor, and cognitive skills. This paper introduces the field to computer scientists by explaining the rationale...
Billy Harris
SERVICES
2008
71views more  SERVICES 2008»
15 years 5 months ago
Identifying Opportunities for Web Services Security Performance Optimizations
WS-Security is an essential component of the Web services protocol stack. WS-Security provides end-to-end security properties, thereby assuring the participation of nonsecure tran...
Robert A. van Engelen, Wei Zhang
EACL
2006
ACL Anthology
15 years 4 months ago
Why Are They Excited? Identifying and Explaining Spikes in Blog Mood Levels
We describe a method for discovering irregularities in temporal mood patterns appearing in a large corpus of blog posts, and labeling them with a natural language explanation. Sim...
Krisztian Balog, Gilad Mishne, Maarten de Rijke