Sciweavers

205 search results - page 19 / 41
» Detecting algorithmically generated malicious domain names
Sort
View
EVOW
2007
Springer
15 years 6 months ago
Robust Peak Detection and Alignment of nanoLC-FT Mass Spectrometry Data
In liquid chromatography-mass spectrometry (LC-MS) based expression proteomics, samples from different groups are analyzed comparatively in order to detect differences that can p...
Marius C. Codrea, Connie R. Jimenez, Sander R. Pie...
84
Voted
GECCO
2008
Springer
144views Optimization» more  GECCO 2008»
15 years 26 days ago
Multi-resistant radar jamming using genetic algorithms
The next generation of advanced self-protection jammers is expected to deliver effective and energy efficient jamming against modern air tracking radars. However, optimizing such ...
Hans Jonas Fossum Moen, Stein Kristoffersen
CL
2002
Springer
14 years 11 months ago
Behavioural typing for safe ambients
We introduce a typed variant of Safe Ambients, named Secure Safe Ambients (SSA), whose type system allows behavioral invariants of ambients to be expressed and verified. The most ...
Michele Bugliesi, Giuseppe Castagna
CVPR
2004
IEEE
16 years 1 months ago
An Algorithm for Multiple Object Trajectory Tracking
Most tracking algorithms are based on the maximum a posteriori (MAP) solution of a probabilistic framework called Hidden Markov Model, where the distribution of the object state a...
Mei Han, Wei Xu, Hai Tao, Yihong Gong
IAT
2009
IEEE
15 years 6 months ago
Group Recommendation with Automatic Identification of Users Communities
—Recommender systems usually propose items to single users. However, in some domains like Mobile IPTV or Satellite Systems it might be impossible to generate a program schedule f...
Ludovico Boratto, Salvatore Carta, Alessandro Ches...