Sciweavers

5090 search results - page 877 / 1018
» Constructing Strategies for Programming
Sort
View
ICC
2007
IEEE
141views Communications» more  ICC 2007»
15 years 10 months ago
A Hybrid Model to Detect Malicious Executables
— We present a hybrid data mining approach to detect malicious executables. In this approach we identify important features of the malicious and benign executables. These feature...
Mohammad M. Masud, Latifur Khan, Bhavani M. Thurai...
LICS
2007
IEEE
15 years 10 months ago
Static Name Control for FreshML
FreshML extends ML with constructs for declaring and ting abstract syntax trees that involve names and statically scoped binders. It is impure: name generation is an observable si...
François Pottier
SEMCO
2007
IEEE
15 years 10 months ago
Evolutionary Conceptual Clustering of Semantically Annotated Resources
A clustering method is presented which can be applied to knowledge bases storing semantically annotated resources. The method can be used to discover groupings of structured objec...
Nicola Fanizzi, Claudia d'Amato, Floriana Esposito
ACCV
2007
Springer
15 years 10 months ago
Task Scheduling in Large Camera Networks
Camera networks are increasingly being deployed for security. In most of these camera networks, video sequences are captured, transmitted and archived continuously from all cameras...
Ser-Nam Lim, Larry S. Davis, Anurag Mittal
CMMR
2007
Springer
114views Music» more  CMMR 2007»
15 years 10 months ago
A Network-Based Framework for Collaborative Development and Performance of Digital Musical Instruments
This paper describes the design and implementation of a framework designed to aid collaborative development of a digital musical instrument mapping layer1 . The goal was to create ...
Joseph Malloch, Stephen Sinclair, Marcelo M. Wande...