Sciweavers

528 search results - page 69 / 106
» Introducing records by refactoring
Sort
View
SAC
2010
ACM
15 years 4 months ago
Botzilla: detecting the "phoning home" of malicious software
Hosts infected with malicious software, so called malware, are ubiquitous in today’s computer networks. The means whereby malware can infiltrate a network are manifold and rang...
Konrad Rieck, Guido Schwenk, Tobias Limmer, Thorst...
SAC
2010
ACM
15 years 4 months ago
A generative pattern model for mining binary datasets
In many application fields, huge binary datasets modeling real life-phenomena are daily produced. The dataset records are usually associated with observations of some events, and...
Claudio Lucchese, Salvatore Orlando, Raffaele Pere...
BIBM
2009
IEEE
127views Bioinformatics» more  BIBM 2009»
15 years 4 months ago
A Device for Detecting and Counting Bites of Food Taken by a Person during Eating
—We introduce methods for detecting in real-time information concerning bites taken during a meal. Our methods use an orientation sensor placed on the wrist of a user, and analyz...
Yujie Dong, Adam Hoover, Eric Muth
PERVASIVE
2009
Springer
15 years 4 months ago
Situvis: A Visual Tool for Modeling a User's Behaviour Patterns in a Pervasive Environment
Abstract. One of the key challenges faced when developing contextaware pervasive systems is to capture the set of inputs that we want a system to adapt to. Arbitrarily specifying r...
Adrian K. Clear, Ross Shannon, Thomas Holland, Aar...
GLOBECOM
2009
IEEE
15 years 4 months ago
Multiple Target Localization Using Compressive Sensing
Abstract— In this paper, a novel multiple target localization approach is proposed by exploiting the compressive sensing theory, which indicates that sparse or compressible signa...
Chen Feng, Shahrokh Valaee, Zhenhui Tan