Sciweavers

817 search results - page 59 / 164
» Malware behaviour analysis
Sort
View
ACSC
2008
IEEE
15 years 6 months ago
An investigation on a community's web search variability
Users’ past search behaviour provides a rich context that an information retrieval system can use to tailor its search results to suit an individual’s or a community’s infor...
Mingfang Wu, Andrew Turpin, Justin Zobel
ICECCS
2007
IEEE
95views Hardware» more  ICECCS 2007»
15 years 6 months ago
A Novel Approach to the Detection of Cheating in Multiplayer Online Games
— Modern online multiplayer games are complex heterogeneous distributed systems comprised of servers and untrusted clients, which are often engineered under considerable commerci...
Peter Laurens, Richard F. Paige, Phillip J. Brooke...
MABS
2007
Springer
15 years 6 months ago
Trust-Based Inter-temporal Decision Making: Emergence of Altruism in a Simulated Society
This paper contributes to the analysis of the question how altruistic behaviour can be in an agent’s own interest. The question is addressed by involving a temporal dimension in ...
Tibor Bosse, Martijn C. Schut, Jan Treur, David We...
GC
2004
Springer
15 years 5 months ago
Symbolic Equivalences for Open Systems
Abstract. Behavioural equivalences on open systems are usually defined by comparing system behaviour in all environments. Due to this “universal” quantification over the poss...
Paolo Baldan, Andrea Bracciali, Roberto Bruni
IEAAIE
2004
Springer
15 years 5 months ago
Machine Learning Approaches for Inducing Student Models
The main issue in e-learning is student modelling, i.e. the analysis of a student’s behaviour and prediction of his/her future behaviour and learning performance. Indeed, it is d...
Oriana Licchelli, Teresa Maria Altomare Basile, Ni...