Sciweavers

13277 search results - page 2524 / 2656
» An Approach to Clustering Abstracts
Sort
View
109
Voted
RAID
2010
Springer
14 years 11 months ago
Detecting the Onset of Infection for Secure Hosts
Abstract. Software flaws in applications such as a browser may be exploited by attackers to launch drive-by-download (DBD), which has become the major vector of malware infection....
Kui Xu, Qiang Ma, Danfeng (Daphne) Yao
RTAS
2010
IEEE
14 years 11 months ago
Multi-Application Deployment in Shared Sensor Networks Based on Quality of Monitoring
Abstract—Wireless sensor networks are evolving from dedicated application-specific platforms to integrated infrastructure shared by multiple applications. Shared sensor networks...
Sangeeta Bhattacharya, Abusayeed Saifullah, Chenya...
119
Voted
SCN
2010
Springer
122views Communications» more  SCN 2010»
14 years 11 months ago
Recursive Lattice Reduction
Abstract. Lattice reduction is known to be a very powerful tool in modern cryptanalysis. In the literature, there are many lattice reduction algorithms that have been proposed with...
Thomas Plantard, Willy Susilo
TMI
2010
172views more  TMI 2010»
14 years 11 months ago
Comparison of AdaBoost and Support Vector Machines for Detecting Alzheimer's Disease Through Automated Hippocampal Segmentation
Abstract— We compared four automated methods for hippocampal segmentation using different machine learning algorithms (1) hierarchical AdaBoost, (2) Support Vector Machines (SVM)...
Jonathan H. Morra, Zhuowen Tu, Liana G. Apostolova...
ICCBR
2010
Springer
14 years 10 months ago
Taxonomic Semantic Indexing for Textual Case-Based Reasoning
Abstract. Case-Based Reasoning (CBR) solves problems by reusing past problemsolving experiences maintained in a casebase. The key CBR knowledge container therefore is its casebase....
Juan A. Recio-García, Nirmalie Wiratunga
« Prev « First page 2524 / 2656 Last » Next »