Sciweavers

2061 search results - page 392 / 413
» Measuring Corner Properties
Sort
View
DAGSTUHL
2010
15 years 1 months ago
From Visualization to Visually Enabled Reasoning
Interactive Visualization has been used to study scientific phenomena, analyze data, visualize information, and to explore large amounts of multivariate data. It enables the human...
Joerg Meyer, Jim Thomas, Stephan Diehl, Brian Fish...
DIMVA
2008
15 years 1 months ago
Embedded Malware Detection Using Markov n-Grams
Embedded malware is a recently discovered security threat that allows malcode to be hidden inside a benign file. It has been shown that embedded malware is not detected by commerci...
M. Zubair Shafiq, Syed Ali Khayam, Muddassar Faroo...
111
Voted
CSREASAM
2003
15 years 1 months ago
Randomized Traitor Tracing Algorithms for Broadcast Security
We introduce and analyze a randomized traitor tracing algorithm for broadcast security. This algorithm is very efficient compared to brute force methods (the mean time it takes is...
Simon McNicol, Serdar Boztas
NIPS
2004
15 years 1 months ago
Maximising Sensitivity in a Spiking Network
We use unsupervised probabilistic machine learning ideas to try to explain the kinds of learning observed in real neurons, the goal being to connect abstract principles of self-or...
Anthony J. Bell, Lucas C. Parra
111
Voted
SBBD
2004
137views Database» more  SBBD 2004»
15 years 1 months ago
A Lock Manager for Collaborative Processing of Natively Stored XML Documents
Today, neither transactional provisions, in general, nor concurrency control, in particular, of DBMS-based processing are tailored to the specific needs of large and collaborative...
Michael Peter Haustein, Theo Härder