Sciweavers

3135 search results - page 279 / 627
» Feature Extraction Using ICA
Sort
View
114
Voted
RAID
2010
Springer
15 years 1 months ago
Using IRP for Malware Detection
Abstract. Run-time malware detection strategies are efficient and robust, which get more and more attention. In this paper, we use I/O Request Package (IRP) sequences for malware d...
FuYong Zhang, DeYu Qi, JingLin Hu
117
Voted
ICASSP
2011
IEEE
14 years 6 months ago
Fall detection in a smart room by using a fuzzy one class support vector machine and imperfect training data
In this paper, we propose an efficient and robust fall detection system by using a fuzzy one class support vector machine based on video information. Two cameras are used to capt...
Miao Yu, Syed Mohsen Naqvi, Adel Rhuma, Jonathon A...
132
Voted
VIS
2004
IEEE
116views Visualization» more  VIS 2004»
16 years 4 months ago
Simplifying Flexible Isosurfaces Using Local Geometric Measures
our tree, an abstraction of a scalar field that encodes the nesting relationships of isosurfaces, can be used to accelerate isosurface extraction, to identify important isovalues ...
Hamish Carr, Jack Snoeyink, Michiel van de Panne
136
Voted
IPMI
1999
Springer
16 years 3 months ago
Statistical Shape Analysis Using Fixed Topology Skeletons: Corpus Callosum Study
The goal of this work is to develop an approach to shape representation and classification that will allow us to detect and quantify differences in shape of anatomical structures d...
Polina Golland, W. Eric L. Grimson, Ron Kikinis
138
Voted
CSE
2009
IEEE
15 years 9 months ago
Real World Routing Using Virtual World Information
—In this paper, we propose to leverage social graphs from Online Social Networks (OSN) to improve the forwarding efficiency of mobile networks, more particularly Delay Tolerant ...
Pan Hui, Nishanth R. Sastry