Sciweavers

425 search results - page 62 / 85
» A novel image-hiding scheme based on block difference
Sort
View
KDD
2009
ACM
173views Data Mining» more  KDD 2009»
15 years 2 months ago
Malware detection using statistical analysis of byte-level file content
Commercial anti-virus software are unable to provide protection against newly launched (a.k.a “zero-day”) malware. In this paper, we propose a novel malware detection techniqu...
S. Momina Tabish, M. Zubair Shafiq, Muddassar Faro...
CVPR
2007
IEEE
15 years 12 months ago
Transfer Learning in Sign language
We build word models for American Sign Language (ASL) that transfer between different signers and different aspects. This is advantageous because one could use large amounts of la...
Ali Farhadi, David A. Forsyth, Ryan White
WCNC
2008
IEEE
15 years 4 months ago
Unequal Error Protection Irregular Over-Complete Mapping for Wavelet Coded Wireless Video Telephony Using Iterative Source and C
— Since the different bits of the compressed video sequence produced by the BBC’s wavelet-based video codec exhibit different error sensitivity, efficient Unequal Error Protec...
Anh Quang Pham, Lie-Liang Yang, Lajos Hanzo
INFOCOM
2008
IEEE
15 years 4 months ago
Reliability Gain of Network Coding in Lossy Wireless Networks
The capacity gain of network coding has been extensively studied in wired and wireless networks. Recently, it has been shown that network coding improves network reliability by re...
Majid Ghaderi, Donald F. Towsley, James F. Kurose
WICON
2008
14 years 11 months ago
Towards optimally exploiting physical layer information in OFDM wireless networks
Wireless communication is inherently vulnerable in nature and packets can be corrupted due to various reasons. The network performance can potentially be improved if one is able t...
Zheng Zeng, P. R. Kumar