Sciweavers

619 search results - page 78 / 124
» Coalition detection and identification
Sort
View
112
Voted
ITCC
2005
IEEE
15 years 4 months ago
Mining Biomedical Images with Density-Based Clustering
Density-based clustering algorithms have recently gained popularity in the data mining field due to their ability to discover arbitrary shaped clusters while preserving spatial pr...
M. Emre Celebi, Y. Alp Aslandogan, Paul R. Bergstr...
80
Voted
ITC
1997
IEEE
121views Hardware» more  ITC 1997»
15 years 3 months ago
BIST-Based Diagnostics of FPGA Logic Blocks
: Accurate diagnosis is an essential requirement in many testing environments, since it is the basis for any repair or replacement strategy used for chip or system fault-tolerance....
Charles E. Stroud, Eric Lee, Miron Abramovici
75
Voted
AAAI
2008
15 years 1 months ago
Learning to Analyze Binary Computer Code
We present a novel application of structured classification: identifying function entry points (FEPs, the starting byte of each function) in program binaries. Such identification ...
Nathan E. Rosenblum, Xiaojin Zhu, Barton P. Miller...
118
Voted
CEAS
2008
Springer
15 years 28 days ago
A Campaign-based Characterization of Spamming Strategies
This paper presents a methodology for the characterization of spamming strategies based on the identification of spam campaigns. To deeply understand how spammers abuse network re...
Pedro Calais, Douglas Pires, Dorgival Olavo Guedes...
LREC
2010
130views Education» more  LREC 2010»
15 years 11 days ago
Modified LTSE-VAD Algorithm for Applications Requiring Reduced Silence Frame Misclassification
The LTSE-VAD is one of the best known algorithms for voice activity detection. In this paper we present a modified version of this algorithm, that makes the VAD decision not takin...
Iker Luengo, Eva Navas, Igor Odriozola, Ibon Sarat...