Sciweavers

6318 search results - page 1198 / 1264
» Data Leakage Detection
Sort
View
PAMI
2007
262views more  PAMI 2007»
15 years 1 months ago
An Efficient Multimodal 2D-3D Hybrid Approach to Automatic Face Recognition
—We present a fully automatic face recognition algorithm and demonstrate its performance on the FRGC v2.0 data. Our algorithm is multimodal (2D and 3D) and performs hybrid (featu...
Ajmal S. Mian, Mohammed Bennamoun, Robyn A. Owens
DAGM
2010
Springer
15 years 9 days ago
Catheter Tracking: Filter-Based vs. Learning-Based
Abstract. Atrial fibrillation is the most common sustained arrhythmia. One important treatment option is radio-frequency catheter ablation (RFCA) of the pulmonary veins attached t...
Alexander Brost, Andreas Wimmer, Rui Liao, Joachim...
KDD
2010
ACM
304views Data Mining» more  KDD 2010»
15 years 5 days ago
Automatic malware categorization using cluster ensemble
Malware categorization is an important problem in malware analysis and has attracted a lot of attention of computer security researchers and anti-malware industry recently. Today...
Yanfang Ye, Tao Li, Yong Chen, Qingshan Jiang
RAID
2010
Springer
15 years 4 days ago
Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory
Dynamic kernel memory has been a popular target of recent kernel malware due to the difficulty of determining the status of volatile dynamic kernel objects. Some existing approach...
Junghwan Rhee, Ryan Riley, Dongyan Xu, Xuxian Jian...
RV
2010
Springer
177views Hardware» more  RV 2010»
15 years 4 days ago
Runtime Instrumentation for Precise Flow-Sensitive Type Analysis
We describe a combination of runtime information and static analysis for checking properties of complex and configurable systems. The basic idea of our approach is to 1) let the p...
Etienne Kneuss, Philippe Suter, Viktor Kuncak
« Prev « First page 1198 / 1264 Last » Next »