Sciweavers

817 search results - page 54 / 164
» Malware behaviour analysis
Sort
View
ATAL
2000
Springer
15 years 4 months ago
Plan Analysis for Autonomous Sociological Agents
Abstract. This paper is concerned with the problem of how effective social interaction arises from individual social action and mind. The need to study the individual social mind s...
Michael Luck, Mark d'Inverno
GECCO
2008
Springer
118views Optimization» more  GECCO 2008»
15 years 27 days ago
An analysis of multi-sampled issue and no-replacement tournament selection
Standard tournament selection samples individuals with replacement. The sampling-with-replacement strategy has its advantages but also has issues. One of the commonly recognised i...
Huayang Xie, Mengjie Zhang, Peter Andreae, Mark Jo...
SAINT
2003
IEEE
15 years 5 months ago
Bayesian Analysis of Online Newspaper Log Data
In this paper we address the problem of analyzing web log data collected at a typical online newspaper site. We propose a two-way clustering technique based on probability theory....
Hannes Wettig, Jussi Lahtinen, Tuomas Lepola, Petr...
ATAL
2010
Springer
15 years 29 days ago
A game-theoretic analysis of market selection strategies for competing double auction marketplaces
In this paper, we propose a novel general framework for analysing competing double auction markets that vie for traders, who then need to choose which market to go to. Based on th...
Bing Shi, Enrico H. Gerding, Perukrishnen Vyteling...
IFIPTCS
2010
14 years 9 months ago
A Semiring-Based Trace Semantics for Processes with Applications to Information Leakage Analysis
Abstract. We propose a framework for reasoning about program security building on language-theoretic and coalgebraic concepts. The behaviour of a system is viewed as a mapping from...
Michele Boreale, David Clark, Daniele Gorla