Sciweavers

1298 search results - page 114 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
130
Voted
IANDC
2008
128views more  IANDC 2008»
15 years 3 months ago
Rule-based static analysis of network protocol implementations
Today's software systems communicate over the Internet using standard protocols that have been heavily scrutinized, providing some assurance of resistance to malicious attack...
Octavian Udrea, Cristian Lumezanu, Jeffrey S. Fost...
118
Voted
SCIA
2005
Springer
166views Image Analysis» more  SCIA 2005»
15 years 9 months ago
Clustering Based on Principal Curve
Clustering algorithms are intensively used in the image analysis field in compression, segmentation, recognition and other tasks. In this work we present a new approach in clusteri...
Ioan Cleju, Pasi Fränti, Xiaolin Wu
113
Voted
MMSEC
2006
ACM
220views Multimedia» more  MMSEC 2006»
15 years 9 months ago
Robust blind watermarking mechanism for motion data streams
The commercial reuse of 3D motion capture (Mocap) data in animation and life sciences raises issues with respect to its copyright. In order to improvise content protection of Moca...
Parag Agarwal, Ketaki Adi, B. Prabhakaran
131
Voted
CMSB
2006
Springer
15 years 7 months ago
Possibilistic Approach to Biclustering: An Application to Oligonucleotide Microarray Data Analysis
Abstract. The important research objective of identifying genes with similar behavior with respect to different conditions has recently been tackled with biclustering techniques. I...
Maurizio Filippone, Francesco Masulli, Stefano Rov...
121
Voted
KDD
2002
ACM
152views Data Mining» more  KDD 2002»
16 years 3 months ago
Multimedia Data Mining Framework For Raw Video Sequences
In this paper, we propose a general framework for real time video data mining to be applied to the raw videos (traffic videos, surveillance videos, etc.). We investigate whether t...
Jung-Hwan Oh, Babitha Bandi