Sciweavers

817 search results - page 71 / 164
» Malware behaviour analysis
Sort
View
PKDD
2005
Springer
97views Data Mining» more  PKDD 2005»
15 years 5 months ago
Frequency-Based Separation of Climate Signals
Abstract. The paper presents an example of exploratory data analysis of climate measurements using a recently developed denoising source separation (DSS) framework. We analysed a c...
Alexander Ilin, Harri Valpola
IDEAL
2004
Springer
15 years 5 months ago
Exploiting Safety Constraints in Fuzzy Self-organising Maps for Safety Critical Applications
This paper defines a constrained Artificial Neural Network (ANN) that can be employed for highly-dependable roles in safety critical applications. The derived model is based upon t...
Zeshan Kurd, Tim P. Kelly, Jim Austin
DATE
2003
IEEE
90views Hardware» more  DATE 2003»
15 years 5 months ago
Mapping Applications to an FPFA Tile
Abstract— This paper introduces a transformational design method which can be used to map code written in a high level source language, like C, to a coarse grain reconfigurable ...
Michèl A. J. Rosien, Yuanqing Guo, Gerard J...
APLAS
2007
ACM
15 years 3 months ago
Timed, Distributed, Probabilistic, Typed Processes
This paper studies types and probabilistic bisimulations for a timed -calculus as an effective tool for a compositional analysis of probabilistic distributed behaviour. The types c...
Martin Berger, Nobuko Yoshida
DICTA
2008
15 years 1 months ago
Application of the Particle Filter to Tracking of Fish in Aquaculture Research
The analysis of fish movement as an indicator of fish behaviour plays an important role in aquaculture research. Currently observations are carried out manually using video record...
Tomasz Pinkiewicz, Ray Williams, John Purser