Sciweavers

9316 search results - page 122 / 1864
» Analysis of traceback techniques
Sort
View
136
Voted
CCS
2008
ACM
15 years 5 months ago
Towards experimental evaluation of code obfuscation techniques
While many obfuscation schemes proposed, none of them satisfy any strong definition of obfuscation. Furthermore secure generalpurpose obfuscation algorithms have been proven to be...
Mariano Ceccato, Massimiliano Di Penta, Jasvir Nag...
CSREAEEE
2006
120views Business» more  CSREAEEE 2006»
15 years 5 months ago
When Most Quickly Developing Technique Meets with Most Quickly Developing Country: Towards Understanding Internet in China
- To a large extent, governments and organizations worldwide have recognized that either the broader information communication technologies (ICTs) sector or specifically with respe...
Yun Tang, Lifeng Sun, Hai Qin, Shiqiang Yang, Yuzh...
184
Voted
ESANN
2004
15 years 5 months ago
Data Mining Techniques on the Evaluation of Wireless Churn
This work focuses on one of the most critical issues to plague the wireless telecommunications industry today: the loss of a valuable subscriber to a competitor, also defined as ch...
Jorge Ferreira, Marley B. R. Vellasco, Marco Aur&e...
122
Voted
TMI
1998
91views more  TMI 1998»
15 years 3 months ago
A Vision-Based Technique for Objective Assessment of Burn Scars
—In this paper a method for the objective assessment of burn scars is proposed. The quantitative measures developed in this research provide an objective way to calculate elastic...
Leonid V. Tsap, Dmitry B. Goldgof, Sudeep Sarkar, ...
SBP
2011
Springer
14 years 10 months ago
Using Web-Based Knowledge Extraction Techniques to Support Cultural Modeling
The World Wide Web is a potentially valuable source of information about the cognitive characteristics of cultural groups. However, attempts to use the Web in the context of cultur...
Paul R. Smart, Winston R. Sieck, Nigel R. Shadbolt