Sciweavers

7811 search results - page 1237 / 1563
» computing 2004
Sort
View
147
Voted
KDD
2004
ACM
330views Data Mining» more  KDD 2004»
16 years 5 months ago
Learning to detect malicious executables in the wild
In this paper, we describe the development of a fielded application for detecting malicious executables in the wild. We gathered 1971 benign and 1651 malicious executables and enc...
Jeremy Z. Kolter, Marcus A. Maloof
CADE
2004
Springer
16 years 4 months ago
Automatic Generation of Classification Theorems for Finite Algebras
Abstract. Classifying finite algebraic structures has been a major motivation behind much research in pure mathematics. Automated techniques have aided in this process, but this ha...
Simon Colton, Andreas Meier, Volker Sorge, Roy L. ...
STOC
2004
ACM
134views Algorithms» more  STOC 2004»
16 years 4 months ago
Approximate max-integral-flow/min-multicut theorems
We establish several approximate max-integral-flow / minmulticut theorems. While in general this ratio can be very large, we prove strong approximation ratios in the case where th...
Kenji Obata
OSDI
2004
ACM
16 years 4 months ago
CoDNS: Improving DNS Performance and Reliability via Cooperative Lookups
The Domain Name System (DNS) is a ubiquitous part of everyday computing, translating human-friendly machine names to numeric IP addresses. Most DNS research has focused on server-...
KyoungSoo Park, Vivek S. Pai, Larry L. Peterson, Z...
137
Voted
OSDI
2004
ACM
16 years 4 months ago
Program-Counter-Based Pattern Classification in Buffer Caching
Program-counter-based (PC-based) prediction techniques have been shown to be highly effective and are widely used in computer architecture design. In this paper, we explore the op...
Chris Gniady, Ali Raza Butt, Y. Charlie Hu
« Prev « First page 1237 / 1563 Last » Next »