Sciweavers

205 search results - page 32 / 41
» Detecting algorithmically generated malicious domain names
Sort
View
77
Voted
GECCO
2007
Springer
235views Optimization» more  GECCO 2007»
15 years 3 months ago
Expensive optimization, uncertain environment: an EA-based solution
Real life optimization problems often require finding optimal solution to complex high dimensional, multimodal problems involving computationally very expensive fitness function e...
Maumita Bhattacharya
ICMCS
2006
IEEE
142views Multimedia» more  ICMCS 2006»
15 years 3 months ago
Key Frame Extraction in 3D Video by Rate-Distortion Optimization
3D video, which consists of a sequence of 3D mesh models, can provide detailed 3D information both in spatial and temporal domain. In this paper, a key frame extraction method has...
Jianfeng Xu, Toshihiko Yamasaki, Kiyoharu Aizawa
104
Voted
ADMI
2010
Springer
14 years 11 months ago
Probabilistic Modeling of Mobile Agents' Trajectories
Abstract. We present a method for learning characteristic motion patterns of mobile agents. The method works on two levels. On the first level, it uses the expectation-maximization...
Stepán Urban, Michal Jakob, Michal Pechouce...
79
Voted
BMCBI
2006
114views more  BMCBI 2006»
14 years 9 months ago
A high level interface to SCOP and ASTRAL implemented in Python
Background: Benchmarking algorithms in structural bioinformatics often involves the construction of datasets of proteins with given sequence and structural properties. The SCOP da...
James A. Casbon, Gavin E. Crooks, Mansoor A. S. Sa...
CCS
2005
ACM
15 years 3 months ago
Automatic diagnosis and response to memory corruption vulnerabilities
Cyber attacks against networked computers have become relentless in recent years. The most common attack method is to exploit memory corruption vulnerabilities such as buffer ove...
Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris...