Sciweavers

205 search results - page 35 / 41
» Detecting algorithmically generated malicious domain names
Sort
View
ICDM
2006
IEEE
176views Data Mining» more  ICDM 2006»
15 years 3 months ago
Razor: mining distance-constrained embedded subtrees
Due to their capability for expressing semantics and relationships among data objects, semi-structured documents have become a common way of representing domain knowledge. Compari...
Henry Tan, Tharam S. Dillon, Fedja Hadzic, Elizabe...
PLDI
2005
ACM
15 years 3 months ago
DART: directed automated random testing
We present a new tool, named DART, for automatically testing software that combines three main techniques: (1) automated extraction of the interface of a program with its external...
Patrice Godefroid, Nils Klarlund, Koushik Sen
78
Voted
CVPR
2007
IEEE
15 years 11 months ago
A Bio-inspired Learning Approach for the Classification of Risk Zones in a Smart Space
Learning from experience is a basic task of human brain that is not yet fulfilled satisfactorily by computers. Therefore, in recent years to cope with this issue, bio-inspired app...
Alessio Dore, Matteo Pinasco, Carlo S. Regazzoni
PAMI
2011
14 years 4 months ago
Coded Strobing Photography: Compressive Sensing of High Speed Periodic Videos
—We show that, via temporal modulation, one can observe and capture a high-speed periodic video well beyond the abilities of a low-frame-rate camera. By strobing the exposure wit...
Ashok Veeraraghavan, Dikpal Reddy, Ramesh Raskar

Publication
234views
13 years 22 days ago
Road Scene Understanding from a Single Image
Road scene segmentation is important in computer vision for different applications such as autonomous driving and pedestrian detection. Recovering the 3D structure of road scenes ...
Jose M. Alvarez, Theo Gevers, Yann LeCun, Antonio ...