Sciweavers

3888 search results - page 675 / 778
» Change-Driven Model Transformations
Sort
View
VLDB
2007
ACM
129views Database» more  VLDB 2007»
15 years 10 months ago
Processing Forecasting Queries
Forecasting future events based on historic data is useful in many domains like system management, adaptive query processing, environmental monitoring, and financial planning. We...
Songyun Duan, Shivnath Babu
ACSAC
2006
IEEE
15 years 10 months ago
PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware
Modern malware often hide the malicious portion of their program code by making it appear as data at compiletime and transforming it back into executable code at runtime. This obf...
Paul Royal, Mitch Halpin, David Dagon, Robert Edmo...
ICMCS
2006
IEEE
143views Multimedia» more  ICMCS 2006»
15 years 10 months ago
Object Recognition and Recovery by Skeleton Graph Matching
This paper presents a robust and efficient skeleton-based graph matching method for object recognition and recovery applications. The novel feature is to unify both object recogni...
Lei He, Chia Y. Han, William G. Wee
ICPR
2006
IEEE
15 years 10 months ago
A Pixel-wise Object Tracking Algorithm with Target and Background Sample
In this paper, we present a clustering-based tracking algorithm for non-rigid object. Non-rigid object tracking is a challenging task because the target often appears as a concave...
Chunsheng Hua, Haiyuan Wu, Qian Chen, Toshikazu Wa...
IEEEARES
2006
IEEE
15 years 10 months ago
Identifying Intrusions in Computer Networks with Principal Component Analysis
Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
Wei Wang, Roberto Battiti