Sciweavers

487 search results - page 53 / 98
» Personal Information Management (PIM) for Intelligence Analy...
Sort
View
IVS
2007
120views more  IVS 2007»
15 years 1 months ago
Visual exploration and analysis of historic hotel visits
Understanding the spatial and temporal characteristics of individual and group behavior in social networks is a critical component of visual tools for intelligence analysis, emerg...
Chris Weaver, David Fyfe, Anthony Robinson, Deryck...
CCS
2008
ACM
15 years 4 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
KDD
2007
ACM
184views Data Mining» more  KDD 2007»
16 years 2 months ago
Dynamic hybrid clustering of bioinformatics by incorporating text mining and citation analysis
To unravel the concept structure and dynamics of the bioinformatics field, we analyze a set of 7401 publications from the Web of Science and MEDLINE databases, publication years 1...
Bart De Moor, Frizo A. L. Janssens, Wolfgang Gl&au...
SACMAT
2009
ACM
15 years 8 months ago
Analysis of virtual machine system policies
The recent emergence of mandatory access (MAC) enforcement for virtual machine monitors (VMMs) presents an opportunity to enforce a security goal over all its virtual machines (VM...
Sandra Rueda, Hayawardh Vijayakumar, Trent Jaeger
GECCO
2009
Springer
138views Optimization» more  GECCO 2009»
15 years 8 months ago
IMAD: in-execution malware analysis and detection
The sophistication of computer malware is becoming a serious threat to the information technology infrastructure, which is the backbone of modern e-commerce systems. We, therefore...
Syed Bilal Mehdi, Ajay Kumar Tanwani, Muddassar Fa...