Sciweavers

817 search results - page 90 / 164
» Malware behaviour analysis
Sort
View
WSC
2007
15 years 2 months ago
Visualization techniques utilizing the sensitivity analysis of models
Models of real world systems are being increasingly generated from data that describes the behaviour of systems. Data mining techniques, such as Artificial Neural Networks (ANN),...
Ivo Kondapaneni, Pavel Kordík, Pavel Slav&i...
GG
2008
Springer
15 years 29 days ago
Formal Analysis of Model Transformations Based on Triple Graph Rules with Kernels
Abstract. Triple graph transformation has become an important approach for model transformations. Triple graphs consist of a source, a target and a connection graph. The correspond...
Hartmut Ehrig, Ulrike Prange
CORR
2010
Springer
135views Education» more  CORR 2010»
14 years 12 months ago
A stochastic analysis of greedy routing in a spatially-dependent sensor network
For a sensor network, as tractable spatially-dependent node deployment model is presented with the property that the density is inversely proportional to the sink distance. A stoc...
H. Paul Keeler
IJON
2002
120views more  IJON 2002»
14 years 11 months ago
The recognition and analysis of animate objects using neural networks and active contour models
: In this paper we describe a method for tracking walking humans in the visual field. Active contour models are used to track moving objects in a sequence of images. The resulting ...
Ken Tabb, Neil Davey, Rod Adams, Stella J. George
SIAMADS
2010
122views more  SIAMADS 2010»
14 years 6 months ago
Local/Global Analysis of the Stationary Solutions of Some Neural Field Equations
Neural or cortical fields are continuous assemblies of mesoscopic models, also called neural masses, of neural populations that are fundamental in the modeling of macroscopic parts...
Romain Veltz, Olivier D. Faugeras