Sciweavers

23988 search results - page 4578 / 4798
» Social Network Computing
Sort
View
DIMVA
2008
15 years 5 months ago
Learning and Classification of Malware Behavior
Malicious software in form of Internet worms, computer viruses, and Trojan horses poses a major threat to the security of networked systems. The diversity and amount of its variant...
Konrad Rieck, Thorsten Holz, Carsten Willems, Patr...
160
Voted
DMS
2008
106views Multimedia» more  DMS 2008»
15 years 5 months ago
A Multimedia Data Streams Model for Content-based Information Retrieval
: Multimedia applications nowadays are becoming the standard, for they utilize the enormous human brain computational power. In the past, the Relational Database Model was generali...
Shenoda Guirguis, Rohit Kulkarni, Shi-Kuo Chang
FORTE
2007
15 years 5 months ago
The DHCP Failover Protocol: A Formal Perspective
Abstract. We present a formal specification and analysis of a faulttolerant DHCP algorithm, used to automatically configure certain host parameters in an IP network. Our algorith...
Rui Fan, Ralph E. Droms, Nancy D. Griffeth, Nancy ...
IADIS
2008
15 years 5 months ago
A Case-Based Reasoning System to Forecast the Presence Of Oil Slicks
After an oil spill it is essential to know if an area is going to be affected by the oil slicks generated. The system presented here forecasts the presence or not of oil slicks in...
Juan M. Corchado, Aitor Mata, Juan Francisco de Pa...
ICONIP
2008
15 years 5 months ago
Improvement of Practical Recurrent Learning Method and Application to a Pattern Classification Task
Practical Recurrent Learning (PRL) has been proposed as a simple learning algorithm for recurrent neural networks[1][2]. This algorithm enables learning with practical order O(n2 )...
Mohamad Faizal Bin Samsudin, Katsunari Shibata
« Prev « First page 4578 / 4798 Last » Next »