Sciweavers

430 search results - page 65 / 86
» Statistical Certification of Software Systems
Sort
View
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
15 years 1 months ago
Beyond heuristics: learning to classify vulnerabilities and predict exploits
The security demands on modern system administration are enormous and getting worse. Chief among these demands, administrators must monitor the continual ongoing disclosure of sof...
Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, G...
GECCO
2008
Springer
206views Optimization» more  GECCO 2008»
14 years 10 months ago
Improving accuracy of immune-inspired malware detectors by using intelligent features
In this paper, we show that a Bio-inspired classifier’s accuracy can be dramatically improved if it operates on intelligent features. We propose a novel set of intelligent feat...
M. Zubair Shafiq, Syed Ali Khayam, Muddassar Faroo...
TASE
2010
IEEE
14 years 4 months ago
Robust Calibration for Localization in Clustered Wireless Sensor Networks
This paper presents a robust calibration procedure for clustered wireless sensor networks. Accurate calibration of between-node distances is one crucial step in localizing sensor n...
Jung Jin Cho, Yu Ding, Yong Chen, Jiong Tang
IJCNN
2000
IEEE
15 years 1 months ago
Pose Classification Using Support Vector Machines
The field of human-computer interaction has been widely investigated in the last years, resulting in a variety of systems used in different application fields like virtual reality...
Edoardo Ardizzone, Antonio Chella, Roberto Pirrone
SASO
2008
IEEE
15 years 4 months ago
nuBOINC: BOINC Extensions for Community Cycle Sharing
Currently, cycle sharing over the Internet is a one-way deal. Computer owners only have one role in the process: to donate their computers’ idle time. This is due to the fact th...
João Nuno Silva, Luís Veiga, Paulo F...