Sciweavers

8177 search results - page 1493 / 1636
» Detecting System Emulators
Sort
View
140
Voted
ENTCS
2007
118views more  ENTCS 2007»
15 years 3 months ago
Safe Adaptation of Component Coordination
In the domain of software engineering, the use of software components is now a well established approach. However, it raises problems about the dynamic adaptation of these compone...
Christophe Sibertin-Blanc, Philippe Mauran, G&eacu...
130
Voted
MVA
2008
196views Computer Vision» more  MVA 2008»
15 years 3 months ago
Evaluation of an appearance-based 3D face tracker using dense 3D data
The ability to detect and track human heads and faces in video sequences can be considered as the finest level of any video surveillance system. In this paper, we introduce a gener...
Fadi Dornaika, Angel Domingo Sappa
126
Voted
NAR
2008
122views more  NAR 2008»
15 years 3 months ago
The Rice Annotation Project Database (RAP-DB): 2008 update
The Rice Annotation Project Database (RAP-DB) was created to provide the genome sequence assembly of the International Rice Genome Sequencing Project (IRGSP), manually curated ann...
152
Voted
IAJIT
2007
150views more  IAJIT 2007»
15 years 3 months ago
Fuzzy Active Queue Management for Congestion Control in Wireless Ad-Hoc
: Mobile ad-hoc network is a network without infrastructure where every node has its own protocols and services for powerful cooperation in the network. Every node also has the abi...
Essam Natsheh, Adznan B. Jantan, Sabira Khatun, Su...
123
Voted
PR
2008
145views more  PR 2008»
15 years 3 months ago
Probabilistic suffix models for API sequence analysis of Windows XP applications
Given the pervasive nature of malicious mobile code (viruses, worms, etc.), developing statistical/structural models of code execution is of considerable importance. We investigat...
Geoffrey Mazeroff, Jens Gregor, Michael G. Thomaso...
« Prev « First page 1493 / 1636 Last » Next »