Sciweavers

2830 search results - page 389 / 566
» No Science without Semantics
Sort
View
ACSAC
2007
IEEE
15 years 10 months ago
MetaAware: Identifying Metamorphic Malware
Detection of malicious software (malware) by the use of static signatures is often criticized for being overly simplistic. Available methods of obfuscating code (so-called metamor...
Qinghua Zhang, Douglas S. Reeves
EDOC
2007
IEEE
15 years 10 months ago
Getting Rid of the OR-Join in Business Process Models
Abstract— In practice, the development of process-aware information systems suffers from a gap between conceptual business process models and executable workflow specifications...
Jan Mendling, Boudewijn F. van Dongen, Wil M. P. v...
ICDM
2007
IEEE
132views Data Mining» more  ICDM 2007»
15 years 10 months ago
Learning What Makes a Society Tick
We present a machine learning methodology (models, algorithms, and experimental data) to discovering the agent dynamics that drive the evolution of the social groups in a communit...
Hung-Ching Chen, Mark K. Goldberg, Malik Magdon-Is...
IPPS
2007
IEEE
15 years 10 months ago
Static-Priority Scheduling and Resource Hold Times
The duration of time for which each application locks each shared resource is critically important in composing multiple independently-developed applications upon a shared “open...
Marko Bertogna, Nathan Fisher, Sanjoy K. Baruah
ROMAN
2007
IEEE
111views Robotics» more  ROMAN 2007»
15 years 10 months ago
Understanding Rules in Human-Robot Instructions
— This paper presents an overview of the systematic creation of a human-robot instruction system from a multi-modal corpus. The corpus has been collected from human-to-human card...
Joerg C. Wolf, Guido Bugmann