Sciweavers

5675 search results - page 115 / 1135
» Exploiting Chaos for Computation
Sort
View
119
Voted
IJDE
2006
95views more  IJDE 2006»
15 years 24 days ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum
AAMAS
2005
Springer
15 years 22 days ago
Learning and Exploiting Relative Weaknesses of Opponent Agents
Agents in a competitive interaction can greatly benefit from adapting to a particular adversary, rather than using the same general strategy against all opponents. One method of s...
Shaul Markovitch, Ronit Reger
125
Voted
PAMI
2007
144views more  PAMI 2007»
15 years 9 days ago
Facial Action Unit Recognition by Exploiting Their Dynamic and Semantic Relationships
—A system that could automatically analyze the facial actions in real time has applications in a wide range of different fields. However, developing such a system is always chall...
Yan Tong, Wenhui Liao, Qiang Ji
CCS
2011
ACM
14 years 24 days ago
Fashion crimes: trending-term exploitation on the web
Online service providers are engaged in constant conflict with miscreants who try to siphon a portion of legitimate traffic to make illicit profits. We study the abuse of “tr...
Tyler Moore, Nektarios Leontiadis, Nicolas Christi...
120
Voted
CIKM
2011
Springer
14 years 24 days ago
Exploiting longer cycles for link prediction in signed networks
We consider the problem of link prediction in signed networks. Such networks arise on the web in a variety of ways when users can implicitly or explicitly tag their relationship w...
Kai-Yang Chiang, Nagarajan Natarajan, Ambuj Tewari...