Sciweavers

5254 search results - page 837 / 1051
» The Evaluation of Courses in Information Systems
Sort
View
USS
2004
15 years 3 months ago
Static Disassembly of Obfuscated Binaries
Disassembly is the process of recovering a symbolic representation of a program's machine code instructions from its binary representation. Recently, a number of techniques h...
Christopher Krügel, William K. Robertson, Fre...
123
Voted
AAAI
1993
15 years 3 months ago
Finding Accurate Frontiers: A Knowledge-Intensive Approach to Relational Learning
learning (EBL) component. In this paper we provide a brief review of FOIL and FOCL, then discuss how operationalizing a domain theory can adversely affect the accuracy of a learned...
Michael J. Pazzani, Clifford Brunk
ADVCS
2008
140views more  ADVCS 2008»
15 years 2 months ago
Reputation for Innovating Social Networks
Reputation is a fundamental instrument of partner selection. Developed within the domain of electronic auctions, reputation technology is being been imported into other applicatio...
Rosaria Conte, Mario Paolucci, Jordi Sabater-Mir
IJNSEC
2008
150views more  IJNSEC 2008»
15 years 1 months ago
Tamper Resistant Software Through Intent Protection
One approach to protect distributed systems implemented with mobile code is through program obfuscation. Disguising program intent is a form of information hiding that facilitates...
Alec Yasinsac, J. Todd McDonald
JNCA
2006
92views more  JNCA 2006»
15 years 1 months ago
Cards-to-presentation on the web: generating multimedia contents featuring agent animations
With the goal of supporting the knowledge circulation and creation process in a society, we have studied story-based communication in a network community. On the basis of this res...
Yukiko I. Nakano, Toshihiro Murayama, Masashi Okam...