Sciweavers

662 search results - page 91 / 133
» The Functionality Attribute of Cybergenres
Sort
View
JMLR
2006
132views more  JMLR 2006»
14 years 9 months ago
Learning to Detect and Classify Malicious Executables in the Wild
We describe the use of machine learning and data mining to detect and classify malicious executables as they appear in the wild. We gathered 1,971 benign and 1,651 malicious execu...
Jeremy Z. Kolter, Marcus A. Maloof
BMCBI
2005
112views more  BMCBI 2005»
14 years 9 months ago
Integration of the Gene Ontology into an object-oriented architecture
Background: To standardize gene product descriptions, a formal vocabulary defined as the Gene Ontology (GO) has been developed. GO terms have been categorized into biological proc...
Daniel Shegogue, W. Jim Zheng
TOG
2008
174views more  TOG 2008»
14 years 9 months ago
Real-time smoke rendering using compensated ray marching
We present a real-time algorithm called compensated ray marching for rendering of smoke under dynamic low-frequency environment lighting. Our approach is based on a decomposition ...
Kun Zhou, Zhong Ren, Stephen Lin, Hujun Bao, Baini...
ICDM
2010
IEEE
212views Data Mining» more  ICDM 2010»
14 years 7 months ago
Modeling Information Diffusion in Implicit Networks
Social media forms a central domain for the production and dissemination of real-time information. Even though such flows of information have traditionally been thought of as diffu...
Jaewon Yang, Jure Leskovec
MASS
2010
140views Communications» more  MASS 2010»
14 years 7 months ago
InterMR: Inter-MANET routing in heterogeneous MANETs
The advancements of diverse radio technologies and emerging applications have spawned increasing heterogeneity in mobile ad hoc networks (MANETs). But the collaborative nature of c...
Seung-Hoon Lee, Starsky H. Y. Wong, Chi-Kin Chau, ...