Sciweavers

2790 search results - page 392 / 558
» Pattern Recognition in a Bucket
Sort
View
SAC
2010
ACM
15 years 12 months ago
Botzilla: detecting the "phoning home" of malicious software
Hosts infected with malicious software, so called malware, are ubiquitous in today’s computer networks. The means whereby malware can infiltrate a network are manifold and rang...
Konrad Rieck, Guido Schwenk, Tobias Limmer, Thorst...
HICSS
2009
IEEE
105views Biometrics» more  HICSS 2009»
15 years 12 months ago
Digital Pen: Four Rounds of Ethnographic and Field Research
We report on a year-long qualitative and ethnographic project to examine the value of digital pen technology for note taking. A digital pen captures a facsimile of information wri...
Christopher N. Chapman, Michal Lahav, Susan Burges...
KDD
2009
ACM
174views Data Mining» more  KDD 2009»
15 years 12 months ago
Visual exploration of categorical and mixed data sets
For categorical data there does not exist any similarity measure which is as straight forward and general as the numerical distance between numerical items. Due to this it is ofte...
Sara Johansson
IEEEPACT
2009
IEEE
15 years 11 months ago
Analytical Modeling of Pipeline Parallelism
Parallel programming is a requirement in the multi-core era. One of the most promising techniques to make parallel programming available for the general users is the use of parall...
Angeles G. Navarro, Rafael Asenjo, Siham Tabik, Ca...
CIVR
2009
Springer
257views Image Analysis» more  CIVR 2009»
15 years 11 months ago
Trajectory-based handball video understanding
This paper presents a content-based approach for understanding handball videos. Tracked players are characterized by their 2D trajectories in the court plane. The trajectories and...
Alexandre Hervieu, Patrick Bouthemy, Jean-Pierre L...