Sciweavers

817 search results - page 133 / 164
» Malware behaviour analysis
Sort
View
POPL
2012
ACM
13 years 7 months ago
Resource-sensitive synchronization inference by abduction
We present an analysis which takes as its input a sequential program, augmented with annotations indicating potential parallelization opportunities, and a sequential proof, writte...
Matko Botincan, Mike Dodds, Suresh Jagannathan
ECCV
2004
Springer
16 years 1 months ago
Morphological Operations on Matrix-Valued Images
The output of modern imaging techniques such as diffusion tensor MRI or the physical measurement of anisotropic behaviour in materials such as the stress-tensor consists of tensor-...
Bernhard Burgeth, Martin Welk, Christian Feddern, ...
ICPR
2002
IEEE
16 years 26 days ago
Interacting Multiple Model (IMM) Kalman Filters for Robust High Speed Human Motion Tracking
Accurate and robust tracking of humans is of growing interest in the image processing and computer vision communities. The ability of a vision system to track the subjects and acc...
Michael E. Farmer, Rein-Lien Hsu, Anil K. Jain
KDD
2003
ACM
243views Data Mining» more  KDD 2003»
16 years 6 days ago
Accurate decision trees for mining high-speed data streams
In this paper we study the problem of constructing accurate decision tree models from data streams. Data streams are incremental tasks that require incremental, online, and any-ti...
João Gama, Pedro Medas, Ricardo Rocha
ASUNAM
2009
IEEE
15 years 6 months ago
Harnessing Wisdom of the Crowds Dynamics for Time-Dependent Reputation and Ranking
—The “wisdom of the crowds” is a concept used to describe the utility of harnessing group behaviour, where user opinion evolves over time and the opinion of the masses collec...
Elizabeth M. Daly