Sciweavers

94 search results - page 11 / 19
» An Empirical Analysis of Pattern Scan Order in Pattern Match...
Sort
View
IJNSEC
2006
96views more  IJNSEC 2006»
14 years 9 months ago
A Memory Symptom-based Virus Detection Approach
The widespread use of the Internet has caused computer security to become an important issue. Currently, antivirus software is the primary mechanism that prevents computers from t...
Hsien-Chou Liao, Yi-Hsiang Wang
ICA
2012
Springer
13 years 5 months ago
On Revealing Replicating Structures in Multiway Data: A Novel Tensor Decomposition Approach
A novel tensor decomposition called pattern or P-decomposition is proposed to make it possible to identify replicating structures in complex data, such as textures and patterns in ...
Anh Huy Phan, Andrzej Cichocki, Petr Tichavsk&yacu...
75
Voted
ICDAR
2009
IEEE
14 years 7 months ago
Pen Acoustic Emissions for Text and Gesture Recognition
The sounds generated by a writing instrument provide a rich and under-utilized source of information for pattern recognition. We examine the feasibility of recognition of handwrit...
Andrew G. Seniuk, Dorothea Blostein
74
Voted
AINA
2008
IEEE
15 years 4 months ago
Exploiting Frequent Episodes in Weighted Suffix Tree to Improve Intrusion Detection System
In this paper we proposed a weighted suffix tree and find out it can improve the Intrusion Detection System (IDS). We firstly focus on the analysis of computer kernel system call,...
Min-Feng Wang, Yen-Ching Wu, Meng-Feng Tsai
PR
2000
120views more  PR 2000»
14 years 9 months ago
On internal representations in face recognition systems
This survey compares internal representations of the recent as well as more traditional face recognition techniques to classify them into several broad categories. The categories ...
Maxim A. Grudin