Sciweavers

1256 search results - page 237 / 252
» Tools for Exploring Natural Language
Sort
View
116
Voted
IJDE
2006
95views more  IJDE 2006»
15 years 14 days ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum
78
Voted
ENVSOFT
2007
76views more  ENVSOFT 2007»
15 years 13 days ago
Biocomplexity of deforestation in the Caparo tropical forest reserve in Venezuela: An integrated multi-agent and cellular automa
A multi-agent model of social and environmental complexity of deforestation was developed for the Caparo Forest Reserve, Venezuela. It includes three types of agents: settlers, go...
Niandry Moreno, Raquel Quintero, Magdiel Ablan, Ro...
IMCS
2007
77views more  IMCS 2007»
15 years 11 days ago
Incident response requirements for distributed security information management systems
Purpose – Security information management systems (SIMs) have been providing a unified distributed platform for the efficient management of security information produced by co...
Sarandis Mitropoulos, Dimitrios Patsos, Christos D...
88
Voted
ML
1998
ACM
15 years 4 days ago
On Restricted-Focus-of-Attention Learnability of Boolean Functions
In the k-Restricted-Focus-of-Attention (k-RFA) model, only k of the n attributes of each example are revealed to the learner, although the set of visible attributes in each example...
Andreas Birkendorf, Eli Dichterman, Jeffrey C. Jac...
ISW
2010
Springer
14 years 10 months ago
Artificial Malware Immunization Based on Dynamically Assigned Sense of Self
Computer malwares (e.g., botnets, rootkits, spware) are one of the most serious threats to all computers and networks. Most malwares conduct their malicious actions via hijacking t...
Xinyuan Wang, Xuxian Jiang