Sciweavers

4052 search results - page 612 / 811
» Comparing Networks from a Data Analysis Perspective
Sort
View
INFOCOM
2006
IEEE
15 years 10 months ago
Comparison Studies between Pre-Shared and Public Key Exchange Mechanisms for Transport Layer Security
Abstract— The pre-shared key based mechanisms for Transport Layer Security (TLS) were recently standardized by the IETF to extend the set of ciphersuites by utilizing existing ke...
Fang-Chun Kuo, Hannes Tschofenig, Fabian Meyer, Xi...
BIOCOMP
2008
15 years 5 months ago
Identifying Protein Flexibility by NMA
- Here proposed apriori method for identification of protein flexibility relies on one end-state conformation of the protein. This method has comparative advantage over many others...
Kresimir Sikic, Branko Jeren, Sanja Tomic
ICMCS
2006
IEEE
177views Multimedia» more  ICMCS 2006»
15 years 10 months ago
Mixed Type Audio Classification with Support Vector Machine
Content-based classification of audio data is an important problem for various applications such as overall analysis of audio-visual streams, boundary detection of video story se...
Lei Chen 0002, Sule Gündüz, M. Tamer &Ou...
PAMI
2008
160views more  PAMI 2008»
15 years 3 months ago
Emotion Recognition Based on Physiological Changes in Music Listening
Little attention has been paid so far to physiological signals for emotion recognition compared to audiovisual emotion channels such as facial expression or speech. This paper inve...
Jonghwa Kim, Elisabeth André
ICC
2007
IEEE
141views Communications» more  ICC 2007»
15 years 10 months ago
A Hybrid Model to Detect Malicious Executables
— We present a hybrid data mining approach to detect malicious executables. In this approach we identify important features of the malicious and benign executables. These feature...
Mohammad M. Masud, Latifur Khan, Bhavani M. Thurai...