Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Adjeroh, Donald Add to Alert Profile  
 
Options:
Date Reviewed  
  1 - 2 of 2 reviews    
  A survey on malware detection using data mining techniques
Ye Y., Li T., Adjeroh D., Iyengar S. ACM Computing Surveys 50(3): 1-40, 2017.  Type: Article

It is not new that software is eating the world [1]. Industries and businesses everywhere are being “softwareized.” Meanwhile, we cannot deny that malware (malicious software) is also having a feast. This paper prov...
...
Sep 22 2017  
  The Burrows-Wheeler transform: data compression, suffix arrays, and pattern matching
Adjeroh D., Bell T., Mukherjee A., Springer Publishing Company, Incorporated, 2008. 352 pp.  Type: Book (9780387789088)

The focus of the book, the Burrows-Wheeler transform (BWT), is an algorithm that was initially published in 1994, and used in data compression and pattern matching. This lossless block transform was originally introduced for text proce...
...
Nov 26 2008  

   
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy