Sciweavers

1298 search results - page 179 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
DIMVA
2007
15 years 4 months ago
A Study of Malcode-Bearing Documents
By exploiting the object-oriented dynamic composability of modern document applications and formats, malcode hidden in otherwise inconspicuous documents can reach third-party appli...
Wei-Jen Li, Salvatore J. Stolfo, Angelos Stavrou, ...
154
Voted
ICPR
2006
IEEE
16 years 4 months ago
Adaptive Feature Integration for Segmentation of 3D Data by Unsupervised Density Estimation
In this paper, a novel unsupervised approach for the segmentation of unorganized 3D points sets is proposed. The method derives by the mean shift clustering paradigm devoted to se...
Marco Cristani, Umberto Castellani, Vittorio Murin...
141
Voted
TOG
2002
167views more  TOG 2002»
15 years 3 months ago
Interactive control of avatars animated with human motion data
Real-time control of three-dimensional avatars is an important problem in the context of computer games and virtual environments. Avatar animation and control is difficult, howeve...
Jehee Lee, Jinxiang Chai, Paul S. A. Reitsma, Jess...
120
Voted
CCGRID
2007
IEEE
15 years 9 months ago
Integrated Data Reorganization and Disk Mapping for Reducing Disk Energy Consumption
Increasing power consumption of high-performance systems leads to reliability, survivability, and cooling related problems. Motivated by this observation, several recent efforts f...
Seung Woo Son, Mahmut T. Kandemir
135
Voted
CHI
2004
ACM
16 years 3 months ago
Interactive Comprehensible Data Mining
This paper discusses a novel data mining system devised and developed at Birmingham, which attempts to provide a more effective data mining system. It ties in with the workshop go...
Andy Pryke, Russell Beale