Sciweavers

817 search results - page 112 / 164
» Malware behaviour analysis
Sort
View
HICSS
2005
IEEE
152views Biometrics» more  HICSS 2005»
15 years 9 months ago
Query Expansion on a Corporate Intranet: Using LSI to Increase Precision in Explorative Search
Previous research has taught us that the typical nonprofessional information seeker on the World Wide Web submits very short queries resulting in low-precision results. We show th...
Dick Stenmark
BPM
2005
Springer
117views Business» more  BPM 2005»
15 years 9 months ago
Interoperability in Service-Based Communities
Interoperability is a multifaceted problem caused by issues surpassing those of technological incompatibilities. The real interoperability challenges are stemming from various sour...
Toni Ruokolainen, Lea Kutvonen
CONTEXT
2005
Springer
15 years 9 months ago
Impact of the signal control strategy on red light running
This article concerns red-light running at intersections and deals with the impact of different types of control strategies. Red running occurrences at red onset are observed throu...
Sophie Midenet
ICTAC
2005
Springer
15 years 9 months ago
Covarieties of Coalgebras: Comonads and Coequations
Coalgebras provide effective models of data structures and state-transition systems. A virtual covariety is a class of coalgebras closed under coproducts, images of coalgebraic mo...
Ranald Clouston, Robert Goldblatt
FATES
2004
Springer
15 years 9 months ago
Specifying and Generating Test Cases Using Observer Automata
We present a technique for specifying coverage criteria and a method for generating test suites for systems whose behaviours can be described as extended finite state machines (EF...
Johan Blom, Anders Hessel, Bengt Jonsson, Paul Pet...