Sciweavers

14424 search results - page 2714 / 2885
» Modeling Radio Networks
Sort
View
DIMVA
2007
15 years 6 months ago
A Study of Malcode-Bearing Documents
By exploiting the object-oriented dynamic composability of modern document applications and formats, malcode hidden in otherwise inconspicuous documents can reach third-party appli...
Wei-Jen Li, Salvatore J. Stolfo, Angelos Stavrou, ...
DIMVA
2008
15 years 6 months ago
Learning and Classification of Malware Behavior
Malicious software in form of Internet worms, computer viruses, and Trojan horses poses a major threat to the security of networked systems. The diversity and amount of its variant...
Konrad Rieck, Thorsten Holz, Carsten Willems, Patr...
147
Voted
LREC
2010
196views Education» more  LREC 2010»
15 years 6 months ago
HIFI-AV: An Audio-visual Corpus for Spoken Language Human-Machine Dialogue Research in Spanish
In this paper, we describe a new multi-purpose audio-visual database on the context of speech interfaces for controlling household electronic devices. The database comprises speec...
Fernando F. Fernández-Martínez, Juan...
MASCOTS
2010
15 years 6 months ago
Content Delivery Using Replicated Digital Fountains
With a majority of Internet traffic being predicted to be caused by content delivery, it is clear that content delivery applications will consume much of the resources on the Inter...
Niklas Carlsson, Derek L. Eager
EMNLP
2008
15 years 6 months ago
Jointly Combining Implicit Constraints Improves Temporal Ordering
Previous work on ordering events in text has typically focused on local pairwise decisions, ignoring globally inconsistent labels. However, temporal ordering is the type of domain...
Nathanael Chambers, Daniel Jurafsky
« Prev « First page 2714 / 2885 Last » Next »