Sciweavers

4307 search results - page 559 / 862
» Dynamic Spyware Analysis
Sort
View
IMC
2005
ACM
15 years 9 months ago
Network Anomography
Anomaly detection is a first and important step needed to respond to unexpected problems and to assure high performance and security in IP networks. We introduce a framework and ...
Yin Zhang, Zihui Ge, Albert G. Greenberg, Matthew ...
175
Voted
WCRE
1999
IEEE
15 years 8 months ago
Chava: Reverse Engineering and Tracking of Java Applets
Java applets have been used increasingly on web sites to perform client-side processing and provide dynamic content. While many web site analysis tools are available, their focus ...
Jeffrey L. Korn, Yih-Farn Chen, Eleftherios Koutso...
137
Voted
EUROISI
2008
15 years 5 months ago
Buzz Monitoring in Word Space
This paper discusses the task of tracking mentions of some topically interesting textual entity from a continuously and dynamically changing flow of text, such as a news feed, the ...
Magnus Sahlgren, Jussi Karlgren
BMCBI
2006
167views more  BMCBI 2006»
15 years 4 months ago
GOurmet: A tool for quantitative comparison and visualization of gene expression profiles based on gene ontology (GO) distributi
Background: The ever-expanding population of gene expression profiles (EPs) from specified cells and tissues under a variety of experimental conditions is an important but difficu...
Jason M. Doherty, Lynn K. Carmichael, Jason C. Mil...
130
Voted
ICCV
2001
IEEE
16 years 5 months ago
Topology Free Hidden Markov Models: Application to Background Modeling
Hidden Markov Models (HMMs) are increasingly being used in computer vision for applications such as: gesture analysis, action recognition from video, and illumination modeling. Th...
Bjoern Stenger, Visvanathan Ramesh, Nikos Paragios...