Sciweavers

210 search results - page 32 / 42
» Relevance Vector Machine Analysis of Functional Neuroimages
Sort
View
76
Voted
ICC
2007
IEEE
141views Communications» more  ICC 2007»
15 years 4 months ago
A Hybrid Model to Detect Malicious Executables
— We present a hybrid data mining approach to detect malicious executables. In this approach we identify important features of the malicious and benign executables. These feature...
Mohammad M. Masud, Latifur Khan, Bhavani M. Thurai...
CIVR
2010
Springer
276views Image Analysis» more  CIVR 2010»
15 years 2 months ago
Optimizing visual search with implicit user feedback in interactive video retrieval
This paper describes an approach to optimize query by visual example results, by combining visual features and implicit user feedback in interactive video retrieval. To this end, ...
Stefanos Vrochidis, Ioannis Kompatsiaris, Ioannis ...
MINENET
2006
ACM
15 years 3 months ago
SVM learning of IP address structure for latency prediction
We examine the ability to exploit the hierarchical structure of Internet addresses in order to endow network agents with predictive capabilities. Specifically, we consider Suppor...
Robert Beverly, Karen R. Sollins, Arthur Berger
JMLR
2006
132views more  JMLR 2006»
14 years 9 months ago
Learning to Detect and Classify Malicious Executables in the Wild
We describe the use of machine learning and data mining to detect and classify malicious executables as they appear in the wild. We gathered 1,971 benign and 1,651 malicious execu...
Jeremy Z. Kolter, Marcus A. Maloof
94
Voted
BMCBI
2004
140views more  BMCBI 2004»
14 years 9 months ago
What can we learn from noncoding regions of similarity between genomes?
Background: In addition to known protein-coding genes, large amounts of apparently non-coding sequence are conserved between the human and mouse genomes. It seems reasonable to as...
Thomas A. Down, Tim J. P. Hubbard