Sciweavers

817 search results - page 141 / 164
» Malware behaviour analysis
Sort
View
ICVS
2003
Springer
15 years 5 months ago
Trajectory Based Assessment of Coordinated Human Activity
Most approaches to detection and classification of human activity deal with observing individual persons. However, people often tend to organize into groups to achieve certain goa...
Marko Jug, Janez Pers, Branko Dezman, Stanislav Ko...
GECCO
2009
Springer
134views Optimization» more  GECCO 2009»
15 years 4 months ago
Estimating the distribution and propagation of genetic programming building blocks through tree compression
Shin et al [19] and McKay et al [15] previously applied tree compression and semantics-based simplification to study the distribution of building blocks in evolving Genetic Progr...
Robert I. McKay, Xuan Hoai Nguyen, James R. Cheney...
AGENTS
2001
Springer
15 years 4 months ago
Principles of intention reconsideration
We present a framework that enables a belief-desire-intention (BDI) agent to dynamically choose its intention reconsideration policy in order to perform optimally in accordance wi...
Martijn C. Schut, Michael Wooldridge
INAP
2001
Springer
15 years 4 months ago
Towards Reconciling Use Cases via Controlled Language and Graphical Models
Abstract. In requirements engineering use cases are employed to describe the ow of events and the occurrence of states in a future information system. Use cases consist of a set of...
Kathrin Böttger, Rolf Schwitter, Diego Moll&a...
SAFECOMP
2001
Springer
15 years 4 months ago
Tuning of Database Audits to Improve Scheduled Maintenance in Communication Systems
Abstract. To ensure the consistency of database subsystems involved in communication systems (e.g., telephone systems), appropriate scheduled maintenance policies are necessary. Au...
Stefano Porcarelli, Felicita Di Giandomenico, Amin...