Sciweavers

947 search results - page 109 / 190
» Analysis of Techniques to Improve Protocol Processing Latenc...
Sort
View
INFOCOM
2002
IEEE
15 years 6 months ago
Increasing robustness of fault localization through analysis of lost, spurious, and positive symptoms
—This paper utilizes belief networks to implement fault localization in communication systems taking into account comprehensive information about the system behavior. Most previo...
Malgorzata Steinder, Adarshpal S. Sethi
MICCAI
2010
Springer
14 years 11 months ago
Brain Morphometry by Probabilistic Latent Semantic Analysis
The paper proposes a new shape morphometry approach to combine advanced classification techniques with geometric features in order to identify morphological abnormalities on brain...
Umberto Castellani, Alessandro Perina, Vittorio Mu...
WACV
2012
IEEE
13 years 9 months ago
Kernel analysis over Riemannian manifolds for visual recognition of actions, pedestrians and textures
A convenient way of analysing Riemannian manifolds is to embed them in Euclidean spaces, with the embedding typically obtained by flattening the manifold via tangent spaces. This...
Mehrtash Tafazzoli Harandi, Conrad Sanderson, Arno...
VIROLOGY
2008
104views more  VIROLOGY 2008»
15 years 1 months ago
Malware behaviour analysis
Several malware analysis techniques suppose that the disassembled code of a piece of malware is available, which is however not always possible. This paper proposes a flexible and ...
Gérard Wagener, Radu State, Alexandre Dulau...
RAID
2005
Springer
15 years 6 months ago
Environment-Sensitive Intrusion Detection
We perform host-based intrusion detection by constructing a model from a program’s binary code and then restricting the program’s execution by the model. We improve the effecti...
Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke...