Sciweavers

1256 search results - page 237 / 252
» Tools for Exploring Natural Language
Sort
View
IJDE
2006
95views more  IJDE 2006»
14 years 10 months ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum
ENVSOFT
2007
76views more  ENVSOFT 2007»
14 years 10 months ago
Biocomplexity of deforestation in the Caparo tropical forest reserve in Venezuela: An integrated multi-agent and cellular automa
A multi-agent model of social and environmental complexity of deforestation was developed for the Caparo Forest Reserve, Venezuela. It includes three types of agents: settlers, go...
Niandry Moreno, Raquel Quintero, Magdiel Ablan, Ro...
IMCS
2007
77views more  IMCS 2007»
14 years 9 months ago
Incident response requirements for distributed security information management systems
Purpose – Security information management systems (SIMs) have been providing a unified distributed platform for the efficient management of security information produced by co...
Sarandis Mitropoulos, Dimitrios Patsos, Christos D...
ML
1998
ACM
14 years 9 months ago
On Restricted-Focus-of-Attention Learnability of Boolean Functions
In the k-Restricted-Focus-of-Attention (k-RFA) model, only k of the n attributes of each example are revealed to the learner, although the set of visible attributes in each example...
Andreas Birkendorf, Eli Dichterman, Jeffrey C. Jac...
ISW
2010
Springer
14 years 7 months ago
Artificial Malware Immunization Based on Dynamically Assigned Sense of Self
Computer malwares (e.g., botnets, rootkits, spware) are one of the most serious threats to all computers and networks. Most malwares conduct their malicious actions via hijacking t...
Xinyuan Wang, Xuxian Jiang