Sciweavers

2347 search results - page 115 / 470
» Location, location, location: a study of bluejacking practic...
Sort
View
APPINF
2003
14 years 11 months ago
Requirement Indicators for Mobile Work: The MOWAHS Approach
This paper describes eight requirement indicators derived from a mobile work characterisation framework (MWCF). The MWCF is a framework for analysing mobile scenarios (mobile task...
Heri Ramampiaro, Alf Inge Wang, Carl-Fredrik S&osl...
WORM
2003
14 years 11 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
ANLP
1994
105views more  ANLP 1994»
14 years 11 months ago
Modeling Content Identification from Document Images
A new technique to locate content-representing words for a given document image using representation of character shapes is described. A character shape code representation define...
Takehiro Nakayama
CORR
2007
Springer
129views Education» more  CORR 2007»
14 years 10 months ago
A Rank-Metric Approach to Error Control in Random Network Coding
It is shown that the error control problem in random network coding can be reformulated as a generalized decoding problem for rank-metric codes. This result allows many of the too...
Danilo Silva, Frank R. Kschischang, Ralf Koetter
PAMI
2006
147views more  PAMI 2006»
14 years 10 months ago
Bayesian Gaussian Process Classification with the EM-EP Algorithm
Gaussian process classifiers (GPCs) are Bayesian probabilistic kernel classifiers. In GPCs, the probability of belonging to a certain class at an input location is monotonically re...
Hyun-Chul Kim, Zoubin Ghahramani