Sciweavers

817 search results - page 85 / 164
» Malware behaviour analysis
Sort
View
EDOC
2006
IEEE
15 years 6 months ago
Exploring Intentional Modeling and Analysis for Enterprise Architecture
— An enterprise architecture is intended to be a comprehensive blueprint describing the key components and relationships for an enterprise from strategies to business processes t...
Eric S. K. Yu, Markus Strohmaier, Xiaoxue Deng
ICDM
2006
IEEE
148views Data Mining» more  ICDM 2006»
15 years 6 months ago
Data Mining Approaches to Criminal Career Analysis
— Narrative reports and criminal records are stored digitally across individual police departments, enabling the collection of this data to compile a nation-wide database of crim...
Jeroen S. de Bruin, Tim K. Cocx, Walter A. Kosters...
WABI
2005
Springer
124views Bioinformatics» more  WABI 2005»
15 years 5 months ago
Reconstructing Metabolic Networks Using Interval Analysis
Recently, there has been growing interest in the modelling and simulation of biological systems. Such systems are often modelled in terms of coupled ordinary differential equation...
Warwick Tucker, Vincent Moulton
ISSTA
2004
ACM
15 years 5 months ago
Automating commutativity analysis at the design level
Two operations commute if executing them serially in either order results in the same change of state. In a system in which commands may be issued simultaneously by different use...
Greg Dennis, Robert Seater, Derek Rayside, Daniel ...
ICRA
2000
IEEE
103views Robotics» more  ICRA 2000»
15 years 4 months ago
An Eigenscrew Analysis of Mechanism Compliance
Determination of the magnitudes and directions of the constraints of a mechanical system can be achieved by finding the basis of the system’s characteristic compliance matrix. ...
P. L. McAllister, R. E. Ellis