Sciweavers

3771 search results - page 303 / 755
» Subobject Transformation Systems
Sort
View
ML
2010
ACM
155views Machine Learning» more  ML 2010»
15 years 2 months ago
On the infeasibility of modeling polymorphic shellcode - Re-thinking the role of learning in intrusion detection systems
Current trends demonstrate an increasing use of polymorphism by attackers to disguise their exploits. The ability for malicious code to be easily, and automatically, transformed in...
Yingbo Song, Michael E. Locasto, Angelos Stavrou, ...
DCC
2008
IEEE
16 years 4 months ago
A New Object-Based System for Fractal Video Sequences Compression
A novel object-based fractal monocular and stereo video compression scheme with quadtree-based motion and disparity compensation is proposed in this paper. Fractal coding is adopte...
Kamel Belloulata, Shiping Zhu
ICALT
2008
IEEE
15 years 11 months ago
Interaction Analysis as a Multi-Support Approach of Social Computing for Learning, in the "Collaborative Era": Lessons Learned b
Apparently computer technology is shifting its focus, with individual users not being the main target any more. The evolution of Web 2.0 technologies is promoting the development ...
Tharrenos Bratitsis, Angelique Dimitracopoulou
ICC
2007
IEEE
113views Communications» more  ICC 2007»
15 years 10 months ago
Pilot-Aided Fine Synchronization for SC-FDE Systems on Multipath Fading Channels
—With single-carrier frequency-domain equalization (SC-FDE), the carrier-frequency offset (CFO) and samplingfrequency offset (SFO) are embedded in the phase rotations of the comp...
Ping-Hung Chiang, Gordon L. Stüber, Ding-Bing...
MVA
1998
117views Computer Vision» more  MVA 1998»
15 years 4 months ago
A system for a new two-dimensional code: Secure 2D code
Abstract. A new 2D code called Secure 2D code is designed in this paper, both encoder and decoder are also proposed. Secure 2D code can store any kind of data and provides high sec...
Chung-Tsai Yeh, Ling-Hwei Chen