Sciweavers

712 search results - page 86 / 143
» Effective, Automatic Procedure Extraction
Sort
View
NDSS
2008
IEEE
15 years 4 months ago
HookFinder: Identifying and Understanding Malware Hooking Behaviors
Installing various hooks into the victim system is an important attacking strategy employed by malware, including spyware, rootkits, stealth backdoors, and others. In order to def...
Heng Yin, Zhenkai Liang, Dawn Song
EWCBR
2004
Springer
15 years 3 months ago
Learning Feature Taxonomies for Case Indexing
Taxonomic case retrieval systems significantly outperform standard conversational case retrieval systems. However, their feature taxonomies, which are the principal reason for thei...
Kalyan Moy Gupta, David W. Aha, Philip G. Moore
AVSS
2006
IEEE
15 years 1 months ago
Classification-Based Likelihood Functions for Bayesian Tracking
The success of any Bayesian particle filtering based tracker relies heavily on the ability of the likelihood function to discriminate between the state that fits the image well an...
Chunhua Shen, Hongdong Li, Michael J. Brooks
CVPR
2004
IEEE
15 years 1 months ago
Visual Object Categorization Using Distance-Based Discriminant Analysis
This paper formulates the problem of object categorization in the discriminant analysis framework focusing on transforming visual feature data so as to make it conform to the comp...
Serhiy Kosinov, Stéphane Marchand-Maillet, ...
LREC
2008
94views Education» more  LREC 2008»
14 years 11 months ago
A General Methodology for Mapping EuroWordNets to the Suggested Upper Merged Ontology
This paper presents a general methodology to mapping EuroWordNets (Vossen, 1998) to the Suggested Upper Merged Ontology (SUMO; (Niles and Pease, 2001)), and we show its applicatio...
Dennis Spohr