Sciweavers

4620 search results - page 742 / 924
» Comparing Object Encodings
Sort
View
SP
2007
IEEE
107views Security Privacy» more  SP 2007»
15 years 8 months ago
Lurking in the Shadows: Identifying Systemic Threats to Kernel Data
The integrity of kernel code and data is fundamental to the integrity of the computer system. Tampering with the kernel data is an attractive venue for rootkit writers since malic...
Arati Baliga, Pandurang Kamat, Liviu Iftode
AIIA
2007
Springer
15 years 8 months ago
Robust Color-Based Skin Detection for an Interactive Robot
Detection of human skin in an arbitrary image is generally hard. Most color-based skin detection algorithms are based on a static color model of the skin. However, a static model c...
Alvise Lastra, Alberto Pretto, Stefano Tonello, Em...
CONCUR
2007
Springer
15 years 8 months ago
Timed Concurrent Game Structures
Abstract. We propose a new model for timed games, based on concurrent game structures (CGSs). Compared to the classical timed game automata of Asarin et al. [8], our timed CGSs are...
Thomas Brihaye, François Laroussinie, Nicol...
114
Voted
ECML
2007
Springer
15 years 8 months ago
Decision Tree Instability and Active Learning
Decision tree learning algorithms produce accurate models that can be interpreted by domain experts. However, these algorithms are known to be unstable – they can produce drastic...
Kenneth Dwyer, Robert Holte
ECTEL
2007
Springer
15 years 8 months ago
Model Driven E-Learning Platform Integration
The success of the e-learning paradigm observed in recent times created a growing demand for e-learning systems in universities and other educational institutions, that itself led ...
Zuzana Bizonova