Sciweavers

3441 search results - page 580 / 689
» Provenance of Software Development Processes
Sort
View
KDD
2004
ACM
330views Data Mining» more  KDD 2004»
16 years 3 months ago
Learning to detect malicious executables in the wild
In this paper, we describe the development of a fielded application for detecting malicious executables in the wild. We gathered 1971 benign and 1651 malicious executables and enc...
Jeremy Z. Kolter, Marcus A. Maloof
HICSS
2009
IEEE
104views Biometrics» more  HICSS 2009»
15 years 9 months ago
Multiple Social Networks Analysis of FLOSS Projects using Sargas
Due to their characteristics and claimed advantages, several researchers have been investigating free and open-source projects. Different aspects are being studied: for instance, ...
Samuel Felix de Sousa Jr., Marco Antonio Balieiro,...
MM
2009
ACM
217views Multimedia» more  MM 2009»
15 years 9 months ago
Streaming HD H.264 encoder on programmable processors
Programmable processors have great advantage over dedicated ASIC design under intense time-to-market pressure. However, realtime encoding of high-definition (HD) H.264 video (up t...
Nan Wu, Mei Wen, Wei Wu, Ju Ren, Huayou Su, Changq...
HICSS
2008
IEEE
134views Biometrics» more  HICSS 2008»
15 years 9 months ago
Simplified Use Case Driven Approach (SUCADA) for Conversion of Legacy System to COTS Package
The conversion of a legacy system to a system based on a commercial-off-the-shelf (COTS) package demands a dedicated guidance. The assumption that it is just a matter of adopting ...
Jose D. Montero, YongSeog Kim, Jeff Johnson
ICDIM
2008
IEEE
15 years 9 months ago
A framework for RESTful object exchange through schematized XML (unRESTricted)
Client-server architectures with clients on divergent platforms are in need of services that serve a high level of interoperability and a loose binding. It should be prevented tha...
Barbara Van De Keer, Dieter Van Rijsselbergen, Eri...