Sciweavers

1425 search results - page 223 / 285
» The combined ISAC-ER methodology of information systems deve...
Sort
View
VEE
2012
ACM
238views Virtualization» more  VEE 2012»
13 years 5 months ago
Replacement attacks against VM-protected applications
Process-level virtualization is increasingly being used to enhance the security of software applications from reverse engineering and unauthorized modification (called software p...
Sudeep Ghosh, Jason Hiser, Jack W. Davidson
KDD
2008
ACM
164views Data Mining» more  KDD 2008»
15 years 10 months ago
Microscopic evolution of social networks
We present a detailed study of network evolution by analyzing four large online social networks with full temporal information about node and edge arrivals. For the first time at ...
Jure Leskovec, Lars Backstrom, Ravi Kumar, Andrew ...
MM
2006
ACM
175views Multimedia» more  MM 2006»
15 years 3 months ago
The challenge problem for automated detection of 101 semantic concepts in multimedia
We introduce the challenge problem for generic video indexing to gain insight in intermediate steps that affect performance of multimedia analysis methods, while at the same time...
Cees Snoek, Marcel Worring, Jan van Gemert, Jan-Ma...
GECCO
2008
Springer
132views Optimization» more  GECCO 2008»
14 years 11 months ago
Hybridizing an evolutionary algorithm with mathematical programming techniques for multi-objective optimization
In recent years, the development of multi-objective evolutionary algorithms (MOEAs) hybridized with mathematical programming techniques has significantly increased. However, most...
Saúl Zapotecas Martínez, Carlos A. C...
CSDA
2008
128views more  CSDA 2008»
14 years 10 months ago
Classification tree analysis using TARGET
Tree models are valuable tools for predictive modeling and data mining. Traditional tree-growing methodologies such as CART are known to suffer from problems including greediness,...
J. Brian Gray, Guangzhe Fan