Results 61 to 70 of about 17,798 (178)
The article discusses ways to get the content of files, which are modified during the processing in the well-known open source dynamic analysis environment Drakvuf.
S. G. Kovalev
doaj
SciTokens: Capability-Based Secure Access to Remote Scientific Data
The management of security credentials (e.g., passwords, secret keys) for computational science workflows is a burden for scientists and information security officers.
Basney, Jim +7 more
core +1 more source
A Low-Footprint Class Loading Mechanism for Embedded Java Virtual Machines [PDF]
This paper shows that it is possible to dramatically reduce the memory consumption of classes loaded in an embedded Java virtual machine without reducing its functionalities.
Courbot, Alexandre +2 more
core +2 more sources
Towards a General Framework for Formal Reasoning about Java Bytecode Transformation
Program transformation has gained a wide interest since it is used for several purposes: altering semantics of a program, adding features to a program or performing optimizations.
Lanet, Jean-Louis +2 more
core +4 more sources
Functionalism, revisionism, and qualia [PDF]
From the editor's introduction: "Ron Chrisley and Aaron Sloman open Part I of this issue with their article “Functionalism, Revisionism, and Qualia.” Chrisley and Sloman discuss revisionism about qualia—the view that tries to navigate between naïve ...
Chrisley, Ron, Sloman, Aaron
core
Artificial Intelligence in the Context of Human Consciousness [PDF]
Artificial intelligence (AI) can be defined as the ability of a machine to learn and make decisions based on acquired information. AI’s development has incited rampant public speculation regarding the singularity theory: a futuristic phase in which ...
DeFries, Hannah
core +1 more source
Towards virtual machine introspection based security framework for cloud
Virtualization enables provision of resources to users according to their requirement through Infrastructure as a Service (IaaS) delivery model in cloud computing environment. Malicious users could lease cloud resources and use them as platforms to launch attacks.
Bhavesh Borisaniya, Dhiren Patel
openaire +2 more sources
Benchmarking Hyper-Breakpoints for Efficient Virtual Machine Introspection
Virtual Machine Introspection (VMI) is a powerful technology used to detect and analyze malicious software inside Virtual Machines (VMs) from outside. Asynchronously accessing the VM’s memory can be insufficient for efficiently monitoring what is happening inside of a VM.
Lukas Beierlieb +4 more
openaire +1 more source
Thumbs up? Sentiment Classification using Machine Learning Techniques
We consider the problem of classifying documents not by topic, but by overall sentiment, e.g., determining whether a review is positive or negative. Using movie reviews as data, we find that standard machine learning techniques definitively outperform ...
Lee, Lillian +2 more
core +4 more sources
RISE: an open-source architecture for interdisciplinary and reproducible human-robot interaction research. [PDF]
Groß A +4 more
europepmc +1 more source

