Sciweavers

798 search results - page 124 / 160
» presence 2006
Sort
View
IMF
2007
14 years 11 months ago
Towards Reliable Rootkit Detection in Live Response
: Within digital forensics investigations, the term Live Response refers to all activities that collect evidence on live systems. Though Live Response in general alters the state o...
Felix C. Freiling, Bastian Schwittay
AAAI
2006
14 years 11 months ago
SEMAPLAN: Combining Planning with Semantic Matching to Achieve Web Service Composition
Composing existing Web services to deliver new functionality is a difficult problem as it involves resolving semantic, syntactic and structural differences among the interfaces of...
Rama Akkiraju, Biplav Srivastava, Anca-Andreea Iva...
APVIS
2006
14 years 11 months ago
Increasing the readability of graph drawings with centrality-based scaling
A common problem in visualising some networks is the presence of localised high density areas in an otherwise sparse graph. Applying common graph drawing algorithms on such networ...
Damian Merrick, Joachim Gudmundsson
AVI
2006
14 years 11 months ago
A comparison of static and moving presentation modes for image collections
In both professional and personal contexts, a common activity is the search for a target image among a collection of images. The presentation of that collection to a user can assu...
Katy Cooper, Oscar de Bruijn, Robert Spence, Mark ...
92
Voted
DIMVA
2006
14 years 11 months ago
Network-Level Polymorphic Shellcode Detection Using Emulation
Abstract. As state-of-the-art attack detection technology becomes more prevalent, attackers are likely to evolve, employing techniques such as polymorphism and metamorphism to evad...
Michalis Polychronakis, Kostas G. Anagnostakis, Ev...