Sciweavers

21324 search results - page 4064 / 4265
» Making the case for computing
Sort
View
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
15 years 7 months ago
Beyond heuristics: learning to classify vulnerabilities and predict exploits
The security demands on modern system administration are enormous and getting worse. Chief among these demands, administrators must monitor the continual ongoing disclosure of sof...
Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, G...
KDD
2010
ACM
310views Data Mining» more  KDD 2010»
15 years 7 months ago
An integrated machine learning approach to stroke prediction
Stroke is the third leading cause of death and the principal cause of serious long-term disability in the United States. Accurate prediction of stroke is highly valuable for early...
Aditya Khosla, Yu Cao, Cliff Chiung-Yu Lin, Hsu-Ku...
150
Voted
EVOW
2007
Springer
15 years 7 months ago
Scale Invariance for Evolved Interest Operators
Abstract. This work presents scale invariant region detectors that apply evolved operators to extract an interest measure. We evaluate operators using their repeatability rate, and...
Leonardo Trujillo, Gustavo Olague
122
Voted
FBIT
2007
IEEE
15 years 7 months ago
Mapping Genetic Influences on Brain Shape Using Multi-Atlas Fluid Image Alignment
In this pilot study, we developed a set of computer vision based surface segmentation and statistical shape analysis algorithms to study genetic influences on brain structure in a...
Meena Mani, Yi-Yu Chou, Natasha Lepore, Agatha D. ...
SOUPS
2010
ACM
15 years 7 months ago
A closer look at recognition-based graphical passwords on mobile devices
Graphical password systems based on the recognition of photographs are candidates to alleviate current over-reliance on alphanumeric passwords and PINs. However, despite being bas...
Paul Dunphy, Andreas P. Heiner, N. Asokan
« Prev « First page 4064 / 4265 Last » Next »