Sciweavers

409 search results - page 46 / 82
» Review spam detection
Sort
View
BWCCA
2010
14 years 6 months ago
Malware Obfuscation Techniques: A Brief Survey
As the obfuscation is widely used by malware writers to evade antivirus scanners, so it becomes important to analyze how this technique is applied to malwares. This paper explores ...
Ilsun You, Kangbin Yim
CVPR
2008
IEEE
16 years 1 months ago
Discriminative local binary patterns for human detection in personal album
In recent years, local pattern based object detection and recognition have attracted increasing interest in computer vision research community. However, to our best knowledge no p...
Yadong Mu, Shuicheng Yan, Yi Liu, Thomas S. Huang,...
ICIP
2001
IEEE
16 years 1 months ago
A unified memory based approach to cut, dissolve, key frame and scene analysis
We review a memory-based buffer model of visual perception, that combines the lower and middle stages in the analysis of video. This model was originally developed for the detecti...
Aya Aner, John R. Kender
NANONET
2009
Springer
138views Chemistry» more  NANONET 2009»
15 years 4 months ago
Highly Sensitive Arrays of Nano-sized Single-Photon Avalanche Diodes for Industrial and Bio Imaging
In this paper we present a review of recent advances in the field of ultra-sensitive imagers with ultra fast detection capability. Photon counting capability in these sensors is ge...
Edoardo Charbon
COMPSEC
2004
147views more  COMPSEC 2004»
14 years 11 months ago
Characterization of defense mechanisms against distributed denial of service attacks
We propose a characterization of distributed denial of service (DDOS) defenses where reaction points are network-based and attack responses are active. The purpose is to provide a ...
Li-Chiou Chen, Thomas A. Longstaff, Kathleen M. Ca...