Sciweavers

205 search results - page 18 / 41
» Detecting algorithmically generated malicious domain names
Sort
View
CVPR
2009
IEEE
1119views Computer Vision» more  CVPR 2009»
16 years 6 months ago
Adaptive Contour Features in Oriented Granular Space for Human Detection and Segmentation
In this paper, a novel feature named Adaptive Contour Feature (ACF) is proposed for human detection and segmentation. This feature consists of a chain of a number of granules in...
Wei Gao (Tsinghua University), Haizhou Ai (Tsinghu...
MP
2010
116views more  MP 2010»
14 years 10 months ago
Separation algorithms for 0-1 knapsack polytopes
Valid inequalities for 0-1 knapsack polytopes often prove useful when tackling hard 0-1 Linear Programming problems. To generate such inequalities, one needs separation algorithms...
Konstantinos Kaparis, Adam N. Letchford
CCS
2009
ACM
16 years 11 days ago
Automatic discovery of botnet communities on large-scale communication networks
Botnets are networks of compromised computers infected with malicious code that can be controlled remotely under a common command and control (C&C) channel. Recognized as one ...
Wei Lu, Mahbod Tavallaee, Ali A. Ghorbani
ECIR
2009
Springer
15 years 9 months ago
Topic and Trend Detection in Text Collections Using Latent Dirichlet Allocation
Algorithms that enable the process of automatically mining distinct topics in document collections have become increasingly important due to their applications in many fields and ...
Levent Bolelli, Seyda Ertekin, C. Lee Giles
EON
2007
15 years 1 months ago
Detecting Quality Problems in Semantic Metadata without the Presence of a Gold Standard
Detecting quality problems in semantic metadata is crucial for ensuring a high quality semantic web. Current approaches are primarily focused on the algorithms used in semantic met...
Yuangui Lei, Andriy Nikolov