Sciweavers

817 search results - page 136 / 164
» Malware behaviour analysis
Sort
View
ASWEC
2007
IEEE
15 years 6 months ago
A Configurable Event Correlation Architecture for Adaptive J2EE Applications
Distributed applications that adapt as their environment changes are developed from selfmanaging, self-configuring and self-optimising behaviours. This requires constant monitorin...
Yan Liu, Ian Gorton, Vinh Khanh Le
FUZZIEEE
2007
IEEE
15 years 6 months ago
Using Orders of Magnitude and Nominal Variables to Construct Fuzzy Partitions
— The application of Qualitative Reasoning to Learning Algorithms can provide these models with the capability of automate common-sense and expert reasoning. Learning algorithms ...
Cati Olmo, Germán Sánchez, Francesc ...
INFOCOM
2007
IEEE
15 years 6 months ago
Multivariate Online Anomaly Detection Using Kernel Recursive Least Squares
— High-speed backbones are regularly affected by various kinds of network anomalies, ranging from malicious attacks to harmless large data transfers. Different types of anomalies...
Tarem Ahmed, Mark Coates, Anukool Lakhina
TPHOL
2007
IEEE
15 years 6 months ago
Formalising Java's Data Race Free Guarantee
We formalise the data race free (DRF) guarantee provided by Java, as captured by the semi-formal Java Memory Model (JMM) [1] and published in the Java Language Specification [2]. ...
David Aspinall, Jaroslav Sevcík
ATAL
2007
Springer
15 years 6 months ago
Sequential Auctions in Uncertain Information Settings
This paper analyzes sequential auctions for private value objects using second-price sealed-bid rules. Now, the equilibrium bids for such auctions depend on the information uncerta...
S. Shaheen Fatima, Michael Wooldridge, Nicholas R....