Sciweavers

1748 search results - page 213 / 350
» Methods to Create and Use Cross-Domain Analysis Patterns
Sort
View
121
Voted
KDD
2010
ACM
304views Data Mining» more  KDD 2010»
15 years 1 months ago
Automatic malware categorization using cluster ensemble
Malware categorization is an important problem in malware analysis and has attracted a lot of attention of computer security researchers and anti-malware industry recently. Todayâ...
Yanfang Ye, Tao Li, Yong Chen, Qingshan Jiang
ICCAD
2006
IEEE
180views Hardware» more  ICCAD 2006»
16 years 9 days ago
A bitmask-based code compression technique for embedded systems
Embedded systems are constrained by the available memory. Code compression techniques address this issue by reducing the code size of application programs. Dictionary-based code c...
Seok-Won Seong, Prabhat Mishra
PAM
2005
Springer
15 years 9 months ago
Applying Principles of Active Available Bandwidth Algorithms to Passive TCP Traces
Abstract. While several algorithms have been created to actively measure the end-to-end available bandwidth of a network path, they require instrumentation at both ends of the path...
Marcia Zangrilli, Bruce Lowekamp
161
Voted
TASLP
2002
156views more  TASLP 2002»
15 years 3 months ago
Musical genre classification of audio signals
Abstract--Musical genres are categorical labels created by humans to characterize pieces of music. A musical genre is characterized by the common characteristics shared by its memb...
George Tzanetakis, Perry R. Cook
SIBGRAPI
2005
IEEE
15 years 9 months ago
A Maximum Uncertainty LDA-Based Approach for Limited Sample Size Problems : With Application to Face Recognition
A critical issue of applying Linear Discriminant Analysis (LDA) is both the singularity and instability of the within-class scatter matrix. In practice, particularly in image recog...
Carlos E. Thomaz, Duncan Fyfe Gillies