Sciweavers

956 search results - page 65 / 192
» Multiple Views on System Traces
Sort
View
SP
2007
IEEE
135views Security Privacy» more  SP 2007»
15 years 4 months ago
Exploring Multiple Execution Paths for Malware Analysis
Malicious code (or malware) is defined as software that fulfills the deliberately harmful intent of an attacker. Malware analysis is the process of determining the behavior and ...
Andreas Moser, Christopher Krügel, Engin Kird...
TSP
2008
109views more  TSP 2008»
14 years 10 months ago
Constrained Tensor Modeling Approach to Blind Multiple-Antenna CDMA Schemes
In this paper, we consider an uplink multiple-antenna Code-Division Multiple-Access (CDMA) system linking several multiple-antenna mobile users to one multiple-antenna base-statio...
André L. F. de Almeida, Gérard Favie...
IUI
2006
ACM
15 years 4 months ago
Are two talking heads better than one?: when should use more than one agent in e-learning?
Recent interest in the use of software character agents raises the issue of how many agents should be used in online learning. In this paper we review evidence concerning the rela...
Hua Wang, Mark H. Chignell, Mitsuru Ishizuka
ICMCS
2005
IEEE
119views Multimedia» more  ICMCS 2005»
15 years 3 months ago
An Online Video Composition System
This paper presents an information-driven online video composition system. The composition work handled by the system includes dynamically setting multiple pan/tilt/zoom (PTZ) cam...
Qiong Liu, Xiaojin Shi, Don Kimber, Frank Zhao, Fr...
ECAI
2008
Springer
14 years 11 months ago
A decision support system for breast cancer detection in screening programs
The goal of breast cancer screening programs is to detect cancers at an early (preclinical) stage, by using periodic mammographic examinations in asymptomatic women. In evaluating ...
Marina Velikova, Peter J. F. Lucas, Nivea de Carva...