Sciweavers

1702 search results - page 231 / 341
» Hidden Pattern Statistics
Sort
View
SAC
2010
ACM
15 years 12 months ago
Botzilla: detecting the "phoning home" of malicious software
Hosts infected with malicious software, so called malware, are ubiquitous in today’s computer networks. The means whereby malware can infiltrate a network are manifold and rang...
Konrad Rieck, Guido Schwenk, Tobias Limmer, Thorst...
ICC
2009
IEEE
132views Communications» more  ICC 2009»
15 years 12 months ago
Preprocessing DNS Log Data for Effective Data Mining
—The Domain Name Service (DNS) provides a critical function in directing Internet traffic. Defending DNS servers from bandwidth attacks is assisted by the ability to effectively...
Mark E. Snyder, Ravi Sundaram, Mayur Thakur
ICDM
2008
IEEE
96views Data Mining» more  ICDM 2008»
15 years 11 months ago
Filling in the Blanks - Krimp Minimisation for Missing Data
Many data sets are incomplete. For correct analysis of such data, one can either use algorithms that are designed to handle missing data or use imputation. Imputation has the bene...
Jilles Vreeken, Arno Siebes
115
Voted
ICC
2007
IEEE
15 years 11 months ago
Outage Performance of Wireless Systems with LCMV Beamforming for Dominant Interferers Cancellation
— This paper investigates the outage probability of a wireless system with linear constrained minimum variance (LCMV) beamforming using a uniform linear array beamformer. LCMV be...
Hanyu Li, Yu-Dong Yao, Jin Yu
ISBI
2007
IEEE
15 years 11 months ago
C-Arm Distortion Correction Using Patient CT as a Fiducial
X-ray imaging is an extensively used intra-operative imaging modality because of its low cost and portability. These images have to be corrected for geometric distortion in order ...
Gouthami Chintalapani, Russell H. Taylor