— We present a hybrid data mining approach to detect malicious executables. In this approach we identify important features of the malicious and benign executables. These feature...
Mohammad M. Masud, Latifur Khan, Bhavani M. Thurai...
Extracting geographical information from various web sources is likely to be important for a variety of applications. One such use for this information is to enable the study of v...
In this paper we investigate how a small number of high-level concepts derived for video shots, such as Sports, Face, Indoor, etc., can be used effectively for ad hoc search in vi...
In this research, we evaluate the effect of gender in analyzing the performance of sponsored search advertising. We examine a log file with data comprised of nearly 7,000,000 reco...
The concept of self-organization is rapidly gaining importance in the area of distributed computing systems. However, we still lack the necessary means for engineering such system...