Sciweavers

2362 search results - page 173 / 473
» A new approach to edge detection
Sort
View
WCRE
1999
IEEE
15 years 6 months ago
Partial Redesign of Java Software Systems Based on Clone Analysis
Code duplication, plausibly caused by copying source code and slightly modifying it, is often observed in large systems. Clone detection and documentation have been investigated b...
Magdalena Balazinska, Ettore Merlo, Michel Dagenai...
EUSFLAT
2007
176views Fuzzy Logic» more  EUSFLAT 2007»
15 years 3 months ago
Modifying the Classic Peak Picking Technique Using a Fuzzy Multi Agent to Have an Accurate P300-based BCI
EEG-based brain computer interface (BCI) provides a new communication channel between the human brain and a computer. The classification of EEG data is an important task in EEG-ba...
Gholamreza Salimi Khorshidi, Ayyoub Jaafari, Ali M...
USS
2008
15 years 4 months ago
CloudAV: N-Version Antivirus in the Network Cloud
Antivirus software is one of the most widely used tools for detecting and stopping malicious and unwanted files. However, the long term effectiveness of traditional hostbased anti...
Jon Oberheide, Evan Cooke, Farnam Jahanian
TACAS
2012
Springer
275views Algorithms» more  TACAS 2012»
13 years 9 months ago
Pushdown Model Checking for Malware Detection
The number of malware is growing extraordinarily fast. Therefore, it is important to have efficient malware detectors. Malware writers try to obfuscate their code by different tec...
Fu Song, Tayssir Touili
AIPS
2010
15 years 3 months ago
Incrementally Solving STNs by Enforcing Partial Path Consistency
Efficient management and propagation of temporal constraints is important for temporal planning as well as for scheduling. During plan development, new events and temporal constra...
Léon Planken, Mathijs de Weerdt, Neil Yorke...