Sciweavers

801 search results - page 93 / 161
» Robust Nonproprietary Software
Sort
View
ICPR
2010
IEEE
15 years 1 months ago
Malware Detection on Mobile Devices Using Distributed Machine Learning
This paper presents a distributed Support Vector Machine (SVM) algorithm in order to detect malicious software (malware) on a network of mobile devices. The light-weight system mo...
Ashkan Sharifi Shamili, Christian Bauckhage, Tansu...
MEDINFO
2007
257views Healthcare» more  MEDINFO 2007»
14 years 11 months ago
From "Glycosyltransferase" to "Congenital Muscular Dystrophy": Integrating Knowledge from NCBI Entrez Gene and the Gene Ontology
Entrez Gene (EG), Online Mendelian Inheritance in Man (OMIM) and the Gene Ontology (GO) are three complementary knowledge resources that can be used to correlate genomic data with...
Satya Sanket Sahoo, Kelly Zeng, Olivier Bodenreide...
DMIN
2006
105views Data Mining» more  DMIN 2006»
14 years 11 months ago
Structural Analysis and Destabilizing Terrorist Networks
This paper proposed structural analysis and mathematical methods for destabilizing terrorist networks. The three different approaches are discussed for example: (i) cohesion analys...
Nasrullah Memon, Henrik Legind Larsen
GRAPHICSINTERFACE
2001
14 years 11 months ago
Accelerated Splatting using a 3D Adjacency Data Structure
We introduce a new acceleration to the standard splatting volume rendering algorithm. Our method achieves full colour (32-bit), depth-sorted and shaded volume rendering significan...
Jeff Orchard, Torsten Möller
VIP
2001
14 years 11 months ago
High-speed Parameterisable Hough Transform Using Reconfigurable Hardware
Recent developments in reconfigurable hardware technologies have offered high-density high-speed devices with the ability for custom computing whilst maintaining the flexibility o...
Dixon D. S. Deng, Hossam A. ElGindy