Sciweavers

817 search results - page 96 / 164
» Malware behaviour analysis
Sort
View
ISMIR
2004
Springer
201views Music» more  ISMIR 2004»
15 years 5 months ago
MIR In Matlab: The MIDI Toolbox
(150-200 words) The MIDI Toolbox is a compilation of functions for analyzing and visualizing MIDI files in the Matlab computing environment. In this article, the basic issues of th...
Tuomas Eerola, Petri Toiviainen
WAW
2004
Springer
80views Algorithms» more  WAW 2004»
15 years 5 months ago
Dominating Sets in Web Graphs
In this paper we study the size of generalised dominating sets in two graph processes which are widely used to model aspects of the world-wide web. On the one hand, we show that gr...
Colin Cooper, Ralf Klasing, Michele Zito
BPM
2006
Springer
150views Business» more  BPM 2006»
15 years 3 months ago
Towards a Methodology for Deriving Contract-Compliant Business Processes
Abstract. This paper presents a methodology for deriving business process descriptions based on terms in business contract. The aim is to assist process modellers in structuring co...
Zoran Milosevic, Shazia Wasim Sadiq, Maria E. Orlo...
ECIR
2010
Springer
15 years 1 months ago
Colouring the Dimensions of Relevance
In this article we introduce a visualisation technique for analysing relevance and interaction data. It allows the researcher to quickly detect emerging patterns in both interactio...
Ulises Cerviño Beresi, Yunhyong Kim, Mark B...
IWFM
1998
113views Formal Methods» more  IWFM 1998»
15 years 1 months ago
A Use Case Interpretation of B AMN
In this paper we suggest methods to aid the development of specifications using the B method. We propose an objectoriented approach to specification, developing the structure thro...
Richard Shore