Sciweavers

2330 search results - page 342 / 466
» A System for Object Class Detection
Sort
View
WCE
2007
15 years 5 months ago
Novel Auxiliary Techniques in Clustering
— Clustering is grouping of patterns according to similarity or distance in different perspectives. Various data representations, similarity measurements and organization manners...
Mohammad Taheri, Reza Boostani
VIROLOGY
2008
121views more  VIROLOGY 2008»
15 years 4 months ago
Constructing malware normalizers using term rewriting
A malware mutation engine is able to transform a malicious program to create a different version of the program. Such mutation engines are used at distribution sites or in self-pro...
Andrew Walenstein, Rachit Mathur, Mohamed R. Chouc...
JCS
2011
138views more  JCS 2011»
14 years 7 months ago
Automatic analysis of malware behavior using machine learning
Malicious software—so called malware—poses a major threat to the security of computer systems. The amount and diversity of its variants render classic security defenses ineffe...
Konrad Rieck, Philipp Trinius, Carsten Willems, Th...
ICDT
2009
ACM
130views Database» more  ICDT 2009»
16 years 5 months ago
Towards a theory of search queries
The need to manage diverse information sources has triggered the rise of very loosely structured data models, known as "dataspace models." Such information management sy...
George H. L. Fletcher, Jan Van den Bussche, Dirk V...
MM
2009
ACM
138views Multimedia» more  MM 2009»
15 years 11 months ago
WOW: wild-open warning for broadcast basketball video based on player trajectory
In basketball games, wild-open means that there is an offensive player not well defended by his/her opponents. The occurrence of wild-open usually implies the existence of a succe...
Ming-Hsiu Chang, Ming-Chun Tien, Ja-Ling Wu