Sciweavers

817 search results - page 77 / 164
» Malware behaviour analysis
Sort
View
AAMAS
2006
Springer
14 years 12 months ago
A Negotiation Meta Strategy Combining Trade-off and Concession Moves
Abstract. In this paper we present a meta strategy that combines two negotiation tactics. The first one based on concessions, and the second one, a trade-off tactic. The goal of th...
Raquel Ros, Carles Sierra
RTS
2000
143views more  RTS 2000»
14 years 11 months ago
Fast and Precise WCET Prediction by Separated Cache and Path Analyses
Precise run-time prediction suffers from a complexity problem when doing an integrated analysis. This problem is characterised by the conflict between an optimal solution and the c...
Henrik Theiling, Christian Ferdinand, Reinhard Wil...
FMICS
2006
Springer
15 years 3 months ago
Evaluating Quality of Service for Service Level Agreements
Abstract. Quantitative analysis of quality-of-service metrics is an important tool in early evaluation of service provision. This analysis depends on being able to estimate the ave...
Allan Clark, Stephen Gilmore
HCI
2007
15 years 1 months ago
Recognition of Affect Conveyed by Text Messaging in Online Communication
Abstract. In this paper, we address the task of affect recognition from text messaging. In order to sense and interpret emotional information expressed through written language, ru...
Alena Neviarouskaya, Helmut Prendinger, Mitsuru Is...
COMCOM
2002
189views more  COMCOM 2002»
14 years 11 months ago
Intrusion detection techniques and approaches
Recent security incidents and analysis have demonstrated that manual response to such attacks is no longer feasible. Intrusion Detection systems offer techniques for modelling and...
Theuns Verwoerd, Ray Hunt