Sciweavers

5580 search results - page 951 / 1116
» Meta-level Information Extraction
Sort
View
ACSAC
2004
IEEE
15 years 8 months ago
Static Analyzer of Vicious Executables (SAVE)
Software security assurance and malware (trojans, worms, and viruses, etc.) detection are important topics of information security. Software obfuscation, a general technique that ...
Andrew H. Sung, Jianyun Xu, Patrick Chavez, Sriniv...
AINTEC
2006
Springer
15 years 8 months ago
A Topology-Aware Overlay Multicast Approach for Mobile Ad-Hoc Networks
AOMP (Ad-hoc Overlay Multicast Protocol) is a novel approach for application-layer multicast in ad-hoc networks. We introduce in this paper a new algorithm that exploits a few prop...
Mohamed Ali Kâafar, Cyrine Mrabet, Thierry T...
AMDO
2006
Springer
15 years 8 months ago
Combined Head, Lips, Eyebrows, and Eyelids Tracking Using Adaptive Appearance Models
The ability to detect and track human heads and faces in video sequences is useful in a great number of applications, such as human-computer interaction and gesture recognition. Re...
Fadi Dornaika, Javier Orozco, Jordi Gonzàle...
APWEB
2006
Springer
15 years 8 months ago
An Effective System for Mining Web Log
The WWW provides a simple yet effective media for users to search, browse, and retrieve information in the Web. Web log mining is a promising tool to study user behaviors, which co...
Zhenglu Yang, Yitong Wang, Masaru Kitsuregawa
ASWC
2006
Springer
15 years 8 months ago
Web Services Analysis: Making Use of Web Service Composition and Annotation
Automated Web service composition and automated Web service annotation could be seen as complimentary methodologies. While automated annotation allows to extract Web service semant...
Peep Küngas, Mihhail Matskin