Sciweavers

83 search results - page 15 / 17
» Image-Based Anomaly Detection Technique: Algorithm, Implemen...
Sort
View
SIGSOFT
2007
ACM
15 years 10 months ago
Mining specifications of malicious behavior
Malware detectors require a specification of malicious behavior. Typically, these specifications are manually constructed by investigating known malware. We present an automatic t...
Mihai Christodorescu, Somesh Jha, Christopher Krue...
IBPRIA
2007
Springer
15 years 4 months ago
Bayesian Oil Spill Segmentation of SAR Images Via Graph Cuts
Abstract. This paper extends and generalizes the Bayesian semisupervised segmentation algorithm [1] for oil spill detection using SAR images. In the base algorithm on which we buil...
Sónia Pelizzari, José M. Bioucas-Dia...
VLDB
2002
ACM
116views Database» more  VLDB 2002»
14 years 9 months ago
Watermarking Relational Databases
We enunciate the need for watermarking database relations to deter their piracy, identify the unique characteristics of relational data which pose new challenges for watermarking,...
Rakesh Agrawal, Jerry Kiernan
ICC
2008
IEEE
138views Communications» more  ICC 2008»
15 years 4 months ago
Dealing with Sudden Bandwidth Changes in TCP
— In this paper, we propose a novel technique to deal with sudden bandwidth changes in TCP. In the current Internet, sudden bandwidth changes may occur due to vertical handovers ...
Euiyul Ko, Donghyeok An, Ikjun Yeom
TASE
2008
IEEE
14 years 9 months ago
An Intelligent Online Monitoring and Diagnostic System for Manufacturing Automation
Condition monitoring and fault diagnosis in modern manufacturing automation is of great practical significance. It improves quality and productivity, and prevents damage to machine...
Ming Ge, Yangsheng Xu, Ruxu Du