Sciweavers

153 search results - page 24 / 31
» Properties of Signature Change Patterns
Sort
View
DIMVA
2008
15 years 1 months ago
Embedded Malware Detection Using Markov n-Grams
Embedded malware is a recently discovered security threat that allows malcode to be hidden inside a benign file. It has been shown that embedded malware is not detected by commerci...
M. Zubair Shafiq, Syed Ali Khayam, Muddassar Faroo...
BMCBI
2010
86views more  BMCBI 2010»
15 years 15 days ago
Protein binding hot spots and the residue-residue pairing preference: a water exclusion perspective
Background: A protein binding hot spot is a small cluster of residues tightly packed at the center of the interface between two interacting proteins. Though a hot spot constitutes...
Qian Liu, Jinyan Li
MICCAI
2010
Springer
14 years 10 months ago
Image Registration Driven by Combined Probabilistic and Geometric Descriptors
Abstract. Deformable image registration in the presence of considerable contrast differences and large-scale size and shape changes represents a significant challenge for image r...
Linh K. Ha, Marcel Prastawa, Guido Gerig, John H. ...
108
Voted
PR
2008
206views more  PR 2008»
15 years 9 days ago
A study of graph spectra for comparing graphs and trees
The spectrum of a graph has been widely used in graph theory to characterise the properties of a graph and extract information from its structure. It has also been employed as a g...
Richard C. Wilson, Ping Zhu
98
Voted
KDD
2010
ACM
270views Data Mining» more  KDD 2010»
15 years 2 months ago
An energy-efficient mobile recommender system
The increasing availability of large-scale location traces creates unprecedent opportunities to change the paradigm for knowledge discovery in transportation systems. A particular...
Yong Ge, Hui Xiong, Alexander Tuzhilin, Keli Xiao,...