Sciweavers

2339 search results - page 429 / 468
» Software processes for the development of electronic commerc...
Sort
View
121
Voted
KDD
2004
ACM
330views Data Mining» more  KDD 2004»
16 years 2 months ago
Learning to detect malicious executables in the wild
In this paper, we describe the development of a fielded application for detecting malicious executables in the wild. We gathered 1971 benign and 1651 malicious executables and enc...
Jeremy Z. Kolter, Marcus A. Maloof
ICDIM
2008
IEEE
15 years 8 months ago
A framework for RESTful object exchange through schematized XML (unRESTricted)
Client-server architectures with clients on divergent platforms are in need of services that serve a high level of interoperability and a loose binding. It should be prevented tha...
Barbara Van De Keer, Dieter Van Rijsselbergen, Eri...
ISORC
2008
IEEE
15 years 8 months ago
A Real-Time Java Component Model
The Real-Time Specification for Java (RTSJ) [10] is becoming a popular choice in the world of real-time programming. However, the complexities introduced by RTSJ bring the needs ...
Ales Plsek, Philippe Merle, Lionel Seinturier
IPPS
2003
IEEE
15 years 7 months ago
Targeting Tiled Architectures in Design Exploration
Tiled architectures can provide a model for early estimation of global interconnect costs. A design exploration tool for reconfigurable architectures is currently under developmen...
Lilian Bossuet, Wayne Burleson, Guy Gogniat, Vikas...
118
Voted
WORM
2003
15 years 3 months ago
Worm anatomy and model
We present a general framework for reasoning about network worms and analyzing the potency of worms within a specific network. First, we present a discussion of the life cycle of ...
Dan Ellis