Sciweavers

4120 search results - page 805 / 824
» Exploring ocean data
Sort
View
114
Voted
IJDE
2006
95views more  IJDE 2006»
15 years 11 days ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum
COMPUTING
2007
122views more  COMPUTING 2007»
15 years 11 days ago
Error estimation for Bregman iterations and inverse scale space methods in image restoration
In this paper we consider error estimation for image restoration problems based on generalized Bregman distances. This error estimation technique has been used to derive convergen...
Martin Burger, E. Resmerita, Lin He
118
Voted
JAIR
2008
93views more  JAIR 2008»
15 years 11 days ago
Spectrum of Variable-Random Trees
In this paper, we show that a continuous spectrum of randomisation exists, in which most existing tree randomisations are only operating around the two ends of the spectrum. That ...
Fei Tony Liu, Kai Ming Ting, Yang Yu, Zhi-Hua Zhou
CORR
2007
Springer
100views Education» more  CORR 2007»
15 years 11 days ago
Identifying statistical dependence in genomic sequences via mutual information estimates
Questions of understanding and quantifying the representation and amount of information in organisms have become a central part of biological research, as they potentially hold th...
H. M. Aktulga, I. Kontoyiannis, L. A. Lyznik, Luka...
104
Voted
ISF
2006
118views more  ISF 2006»
15 years 11 days ago
Does information security attack frequency increase with vulnerability disclosure? An empirical analysis
Abstract Research in information security, risk management and investment has grown in importance over the last few years. However, without reliable estimates on attack probabiliti...
Ashish Arora, Anand Nandkumar, Rahul Telang