Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,927,286 papers from all fields of science
Search
Sign In
Create Free Account
Heuristic analysis
Heuristic analysis is a method employed by many computer antivirus programs designed to detect previously unknown computer viruses, as well as new…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
5 relations
Antivirus software
Computer
Computer virus
Virtual machine
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Front-End Development for Home Automation Systems using JavaScript Frameworks
Olaf Droegehorn
,
Marie Leslie Melanie Pittumbur
,
J. Porras
2017
Corpus ID: 180262477
Automation technologies are widely acclaimed to have the potential to significantly reduce energy consumption and energy-related…
Expand
2016
2016
Nonlinearity Saturation as a Singular Perturbation of the Nonlinear Schrödinger Equation
K. Glasner
,
Jordan Allen-Flowers
SIAM Journal on Applied Mathematics
2016
Corpus ID: 207070938
Saturation of a Kerr-type nonlinearity in the nonlinear Schroźdinger equation (NLSE) can be regarded as a singular perturbation…
Expand
2016
2016
DecDoc: A Tool for Documenting Design Decisions Collaboratively and Incrementally
Tom-Michael Hesse
,
Arthur Kühlwein
,
T. Roehm
1st International Workshop on Decision Making in…
2016
Corpus ID: 14653896
The outcome and quality of design decisions highly depend on the knowledge reflected during decision-making. Typically, making…
Expand
2009
2009
Reducing the VoIP packet overhead in UMTS air interface
E. R. Vale
,
M. A. Grivet
,
J. C. Brandão
International Conference on Awareness Science and…
2009
Corpus ID: 42945953
Despite the continuous growth of data services, telephony is still the main source of revenue for the third generation mobile…
Expand
2009
2009
A Heuristic Approach for the Automatic Insertion of Checkpoints in Message-Passing Codes
Gabriel Rodríguez
,
María J. Martín
,
P. González
,
J. Touriño
Journal of universal computer science (Online)
2009
Corpus ID: 15519143
Abstract: Checkpointingtoolsmaybetypically implementedattwodifferentabstrac-tion levels: at the system level or at the application…
Expand
2006
2006
Web User Interaction - Comparison of Declarative Approaches
Mikko Pohja
,
M. Honkala
,
Miemo Penttinen
,
P. Vuorimaa
,
Panu Ervamaa
International Conference on Web Information…
2006
Corpus ID: 3168041
The World Wide Web is evolving from a platform for information access into a platform for interactive ser- vices. Several…
Expand
2004
2004
An Ultra‐High Gradient Cerenkov Wakefield Acceleration Experiment at SLAC FFTB
J. Rosenzweig
,
S. Hoover
,
+4 authors
R. Yoder
2004
Corpus ID: 10766223
The creation of ultra‐high current, ultra‐short pulse beams (Q=3 nC, σz= 20 μm) at the SLAC FFTB has opened the way for very high…
Expand
2003
2003
Analysis of a Randomized Local Search Algorithm for LDPCC Decoding Problem
O. Watanabe
,
Takeshi Sawai
,
Hayato Takahashi
2003
Corpus ID: 345388
We propose an approach for analyzing the average performance of a given (randomized) local search algorithm for a constraint…
Expand
Review
2000
Review
2000
Gender and leadership styles : A review of the past decade
M. Engen
,
T. Willemsen
2000
Corpus ID: 16275220
Research on sex differences in leadership styles over the past decade (1987-1999) is reviewed and compared with the results of a…
Expand
1999
1999
A CLASSICAL SELF-CONTAINED PROOF OF KOLMOGOROV'S THEOREM ON INVARIANT TORI
A. Giorgilli
,
U. Locatelli
1999
Corpus ID: 55079618
The celebrated theorem of Kolmogorov on persistence of invariant tori of a nearly integrable Hamiltonian system is revisited in…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE