Sciweavers

817 search results - page 37 / 164
» Malware behaviour analysis
Sort
View
MM
2010
ACM
160views Multimedia» more  MM 2010»
15 years 16 hour ago
Automatic role recognition based on conversational and prosodic behaviour
This paper proposes an approach for the automatic recognition of roles in settings like news and talk-shows, where roles correspond to specific functions like Anchorman, Guest or ...
Hugues Salamin, Alessandro Vinciarelli, Khiet Truo...
NDSS
2006
IEEE
15 years 5 months ago
Modeling Botnet Propagation Using Time Zones
Time zones play an important and unexplored role in malware epidemics. To understand how time and location affect malware spread dynamics, we studied botnets, or large coordinated...
David Dagon, Cliff Changchun Zou, Wenke Lee
ICAC
2005
IEEE
15 years 5 months ago
Decentralised Autonomic Computing: Analysing Self-Organising Emergent Behaviour using Advanced Numerical Methods
When designing decentralised autonomic computing systems, a fundamental engineering issue is to assess systemwide behaviour. Such decentralised systems are characterised by the la...
Tom De Wolf, Giovanni Samaey, Tom Holvoet, Dirk Ro...
CP
2005
Springer
15 years 5 months ago
Search Heuristics and Heavy-Tailed Behaviour
Abstract. The heavy-tailed phenomenon that characterises the runtime distributions of backtrack search procedures has received considerable attention over the past few years. Some ...
Tudor Hulubei, Barry O'Sullivan
CONSTRAINTS
2006
77views more  CONSTRAINTS 2006»
14 years 12 months ago
The Impact of Search Heuristics on Heavy-Tailed Behaviour
Abstract. The heavy-tailed phenomenon that characterises the runtime distributions of backtrack search procedures has received considerable attention over the past few years. Some ...
Tudor Hulubei, Barry O'Sullivan