Software mining

Results: 953



#Item
111Cyberwarfare / Malware / Computer virus / Threat / Avira / Data mining / Antivirus software / Computer security / System software

CYLANCE INFINITY ENGINE Key Benefits 1. Game-changing malware detection - CylanceINFINITYENGINE identifies threats in Windows Portable Executables, PDFs, and Microsoft Office documents using predictive models which can c

Add to Reading List

Source URL: cdn2.hubspot.net

Language: English - Date: 2015-05-01 19:03:47
112Information technology management / Software / Computer security / Computer network security / Anomaly detection / Data mining / Intrusion detection system / Windows Registry / Malware / System software / Data security / Antivirus software

A Comparative Evaluation of Two Algorithms for Windows Registry Anomaly Detection Salvatore J. Stolfo, Frank Apap, Eleazar Eskin, Katherine Heller, Shlomo Hershkop, Andrew Honig, and Krysta Svore {sal,fapap,eeskin,heller

Add to Reading List

Source URL: www.gatsby.ucl.ac.uk

Language: English - Date: 2006-10-19 19:27:44
113Software / Bitcoin / Peer-to-peer computing / Proof-of-work system / Ticket / Public-key cryptography / T puzzle / Consensus / Terahash / Cryptography / Computing / Computer network security

PREPRINT: Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions Andrew Miller, Elaine Shi, Ahmed Kosba, and Jonathan Katz University of Maryland, College Park {amiller,elaine,akosba,jkatz}@cs.umd.e

Add to Reading List

Source URL: cs.umd.edu

Language: English - Date: 2015-02-28 16:56:18
114

Topic: Vocabulary mining for a soft ware product Motivation: Software products involve domain vocabulary. For instance, a human-resources management system can be expected to refer terms of the human resources domain (em

Add to Reading List

Source URL: softlang.uni-koblenz.de

- Date: 2012-10-25 19:03:27
    115X Window System / Goldfields-Esperance / Software / Mining / Occupational safety and health

    NEW Look out for the National Mining Chronicle Next edition you’ll read a

    Add to Reading List

    Source URL: myresources.com.au

    Language: English - Date: 2015-06-09 01:38:43
    116Attribute grammar / HTML element / Software engineering / Data mining / Computer programming / Decision trees / Computing / C4.5 algorithm

    Didacticiel - Etudes de cas R.R. Subject One of the main advantages of decision trees is the possibility, for the users, to interactively

    Add to Reading List

    Source URL: eric.univ-lyon2.fr

    Language: English - Date: 2006-03-03 12:44:09
    117Software / Microsoft Excel / Spreadsheet

    XL-SIPINA R.R. Subject The main bottleneck of data mining software programming is the data management. In using a

    Add to Reading List

    Source URL: eric.univ-lyon2.fr

    Language: English - Date: 2010-08-29 13:55:12
    118Geographic information system / Spatial data analysis / Science / Geography / GIS software / Spatial analysis / Statistics / Data analysis / Data mining

    What’s Special about Spatial Data Mining? Shashi Shekhar Pusheng Zhang Yan Huang Ranga Raju Vatsavai

    Add to Reading List

    Source URL: www.cse.unt.edu

    Language: English - Date: 2004-04-08 14:42:18
    119Business rule mining / Software / Collaboration / Business / Computing / Information technology management / Web 2.0 / Spreadsheet / Online spreadsheets / Numbers

    Paper Title (use style: paper title)

    Add to Reading List

    Source URL: ceur-ws.org

    Language: English - Date: 2015-04-29 08:53:26
    120Bitcoin / Peer-to-peer computing / Payment systems / Financial cryptography / Cryptographic hash functions / Cryptography / Software / Computing

    ISSCCIICT 2014, Limerick, June 26–27 Bitcoin Mining and its Energy Footprint Karl J. O’Dwyer† and David Malone∗ Hamilton Institute National University of Ireland Maynooth

    Add to Reading List

    Source URL: karlodwyer.github.io

    Language: English - Date: 2014-06-25 06:07:20
    UPDATE