Sciweavers

2200 search results - page 210 / 440
» The Generalized Pignistic Transformation
Sort
View
90
Voted
SCAM
2006
IEEE
15 years 6 months ago
Normalizing Metamorphic Malware Using Term Rewriting
Metamorphic malware — including certain viruses and worms — rewrite their code during propagation. This paper presents a method for normalizing multiple variants of metamorphi...
Andrew Walenstein, Rachit Mathur, Mohamed R. Chouc...
106
Voted
DOCENG
2006
ACM
15 years 6 months ago
Fast and simple XML tree differencing by sequence alignment
With the advent of XML we have seen a renewed interest in methods for computing the difference between trees. Methods that include heuristic elements play an important role in pr...
Tancred Lindholm, Jaakko Kangasharju, Sasu Tarkoma
139
Voted
DOLAP
2006
ACM
15 years 6 months ago
Designing ETL processes using semantic web technologies
One of the most important tasks performed in the early stages of a data warehouse project is the analysis of the structure and content of the existing data sources and their inten...
Dimitrios Skoutas, Alkis Simitsis
SIGMETRICS
2006
ACM
121views Hardware» more  SIGMETRICS 2006»
15 years 6 months ago
Transient analysis of tree-Like processes and its application to random access systems
A new methodology to assess transient performance measures of tree-like processes is proposed by introducing the concept of tree-like processes with marked time epochs. As opposed...
Jeroen Van Velthoven, Benny Van Houdt, Chris Blond...
96
Voted
CODES
2005
IEEE
15 years 6 months ago
Iterational retiming: maximize iteration-level parallelism for nested loops
Nested loops are the most critical sections in many scientific and Digital Signal Processing (DSP) applications. It is important to study effective and efficient transformation ...
Chun Xue, Zili Shao, Meilin Liu, Edwin Hsing-Mean ...