نتایج جستجو برای: api call
تعداد نتایج: 110138 فیلتر نتایج به سال:
Machine learning is an important field of artificial intelligence in which models are generated by extracting rules and functions from large datasets. Machine learning includes a diversity of methods and algorithms such as decision trees, lazy learning, knearest neighbors, Bayesian methods, Gaussian processes, artificial neural networks, support vector machines, kernel algorithms, and artificia...
We introduce Eureka, a framework for enabling static analysis on Internet malware binaries. Eureka incorporates a novel binary unpacking strategy based on statistical bigram analysis and coarse-grained execution tracing. The Eureka framework uniquely distinguishes itself from prior work by providing effective evaluation metrics and techniques to assess the quality of the produced unpacked code....
Since early works, web servers have been designed as parallel applications to process many requests at the same time. While web service based applications are performing more and more, larger and larger transactions, this parallelization culture still not reached the client side. Business to Business (B2B) applications are becoming intensive users of web transactions through Service Oriented Ar...
This paper discusses preliminary work on standardizing and implementing a remote procedure call (RPC) mechanism for grid computing. The GridRPC API is designed to address one of the factors that has hindered widespread acceptance of grid computing – the lack of a standardized, portable, and simple programming interface. In this paper, we examine two concrete implementations of the GridRPC API b...
With the increasing availability of source code on the Internet, many new approaches to retrieve, repair, and reuse code have emerged that rely on the ability to efficiently compute the similarity of two pieces of code. The meaning of similarity, however, heavily depends on the application domain. For predicting API calls, for example, programs can be considered similar if they call a specific ...
Metamorphic malware changes the syntax of its code in each infection. This process makes it extremely hard to detect. While the byte sequence of the metamorphic malware may be quite different from its parent, the main functionality of the malware has to stay the same. Therefore, traditional methods based on static signature detection cannot detect such malwares, and need to be designed semantic...
Ensuring the reliability and security of Android apps is important considering the large Android market and the critical usage of Android apps. To analyze and test Android apps, we need to know program paths, i.e., the control flow of callbacks implemented in the apps. One of the challenges to identify such information is the extensive use of the Android API methods in the apps. These methods c...
This article describes GTdowloader, a Python package that serves as both an API wrapper and geographic information pre-processing helper to facilitate the download of Twitter data from API. Specifically, offers functions enable through single integrate access call parameters in form familiar syntax. In addition, is available for common formats further analysis, which includes standard Geographi...
Background: The emergence and re-emergence of antibiotic-resistant foodborne bacteria call for concerted efforts, especially in developing countries. Spices have been employed traditionally to improve the aroma and flavour of foods; however, they could serve as reservoirs for the spread of potential pathogenic organisms. This study aims to investigate the public health implications of antibiot...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید