Sciweavers

817 search results - page 74 / 164
» Malware behaviour analysis
Sort
View
IM
1997
15 years 1 months ago
Conflict Analysis for Management Policies
Policies are a means of influencing management behaviour within a distributed system, without coding the behaviour into the managers. Authorisation policies specify what activitie...
Emil Lupu, Morris Sloman
CHI
2004
ACM
16 years 7 days ago
Dealing with mobile conversations in public places: some implications for the design of socially intrusive technologies
In this paper we describe the results of a study investigating the behaviour and views of bystanders in response to a proximal mobile telephone conversation by a third party. Anal...
Steve Love, Mark Perry
IROS
2006
IEEE
133views Robotics» more  IROS 2006»
15 years 5 months ago
Adapting Playgrounds for Children's Play using Ambient Playware
— This paper presents an approach on how to adapt playgrounds using artificial neural networks (ANN). The playground consists of small tiles each capable of outputting coloured ...
Alireza Derakhshan, Frodi Hammer, Henrik Hautop Lu...
ADAEUROPE
2004
Springer
15 years 5 months ago
The Chance for Ada to Support Distribution and Real-Time in Embedded Systems
This paper presents a modification of GLADE —the current GNAT implementation of the Ada 95 Distributed Systems Annex (DSA)— to support the development of distributed applicatio...
Juan López Campos, J. Javier Gutiérr...
CIMCA
2005
IEEE
15 years 1 months ago
Customised Customer Support Using a Soft Computing Approach
This paper describes the research and development of a methodology to identify the type of information required by the service advisor (CSA) within customer contact centre (CCC) e...
S. Shah, Rajkumar Roy, Ashutosh Tiwari, Basim Maje...