Sciweavers

239 search results - page 38 / 48
» Patterns of co-evolution between requirements and source cod...
Sort
View
108
Voted
EUROSYS
2008
ACM
15 years 9 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos
BMCBI
2007
156views more  BMCBI 2007»
15 years 17 days ago
Bio: : NEXUS: a Perl API for the NEXUS format for comparative biological data
Background: Evolutionary analysis provides a formal framework for comparative analysis of genomic and other data. In evolutionary analysis, observed data are treated as the termin...
Thomas Hladish, Vivek Gopalan, Chengzhi Liang, Wei...
115
Voted
ICML
2009
IEEE
16 years 1 months ago
Deep transfer via second-order Markov logic
Standard inductive learning requires that training and test instances come from the same distribution. Transfer learning seeks to remove this restriction. In shallow transfer, tes...
Jesse Davis, Pedro Domingos
WWW
2009
ACM
16 years 1 months ago
A hybrid phish detection approach by identity discovery and keywords retrieval
Phishing is a significant security threat to the Internet, which causes tremendous economic loss every year. In this paper, we proposed a novel hybrid phish detection method based...
Guang Xiang, Jason I. Hong
114
Voted
WIMOB
2007
IEEE
15 years 6 months ago
Routing Packets into Wireless Mesh Networks
— Wireless mesh networks are a promising way to provide Internet access to fixed and mobile wireless devices. In mesh networks, traffic between mesh nodes and the Internet is r...
Rainer Baumann, Simon Heimlicher, Vincent Lenders,...