Sciweavers

667 search results - page 62 / 134
» Quantization-Based Methods: Additive Attacks Performance Ana...
Sort
View
BMCBI
2010
136views more  BMCBI 2010»
14 years 12 months ago
The IronChip evaluation package: a package of perl modules for robust analysis of custom microarrays
Background: Gene expression studies greatly contribute to our understanding of complex relationships in gene regulatory networks. However, the complexity of array design, producti...
Yevhen Vainshtein, Mayka Sanchez, Alvis Brazma, Ma...
RAID
2010
Springer
14 years 10 months ago
Detecting the Onset of Infection for Secure Hosts
Abstract. Software flaws in applications such as a browser may be exploited by attackers to launch drive-by-download (DBD), which has become the major vector of malware infection....
Kui Xu, Qiang Ma, Danfeng (Daphne) Yao
ICCV
2009
IEEE
14 years 9 months ago
Probabilistic occlusion boundary detection on spatio-temporal lattices
In this paper, we present an algorithm for occlusion boundary detection. The main contribution is a probabilistic detection framework defined on spatio-temporal lattices, which en...
Mehmet Emre Sargin, Luca Bertelli, Bangalore S. Ma...
SBMF
2009
Springer
184views Formal Methods» more  SBMF 2009»
15 years 6 months ago
Concolic Testing of the Multi-sector Read Operation for Flash Memory File System
In today’s information society, flash memory has become a virtually indispensable component, particularly for mobile devices. In order for mobile devices to operate successfully...
Moonzoo Kim, Yunho Kim
ICPR
2008
IEEE
16 years 1 months ago
Shot boundary detection using co-occurrence of global motion in video stream
We propose a method of shot boundary detection based on the co-occurrence of global motion in video stream. In addition to the conventional features based on appearance and local ...
Hironobu Fujiyoshi, Yosuke Murai