Sciweavers

12659 search results - page 2470 / 2532
» The distributed breakout algorithms
Sort
View
KDD
2009
ACM
173views Data Mining» more  KDD 2009»
15 years 2 months ago
Malware detection using statistical analysis of byte-level file content
Commercial anti-virus software are unable to provide protection against newly launched (a.k.a “zero-day”) malware. In this paper, we propose a novel malware detection techniqu...
S. Momina Tabish, M. Zubair Shafiq, Muddassar Faro...
WDAG
2009
Springer
160views Algorithms» more  WDAG 2009»
15 years 2 months ago
Brief Announcement: The Minimum Failure Detector for Non-Local Tasks in Message-Passing Systems
This paper defines the basic notions of local and non-local tasks, and determines the minimum information about failures that is necessary to solve any non-local task in message-p...
Carole Delporte-Gallet, Hugues Fauconnier, Sam Tou...
SIGGRAPH
2010
ACM
15 years 2 months ago
The Frankencamera: an experimental platform for computational photography
Although there has been much interest in computational photography within the research and photography communities, progress has been hampered by the lack of a portable, programm...
Andrew Adams, Eino-Ville Talvala, Sung Hee Park, D...
ISEC
2001
Springer
126views ECommerce» more  ISEC 2001»
15 years 2 months ago
Building Trust for E-Commerce: Collaborating Label Bureaus
A major problem facing the full deployment of business-to-consumer (B2C) e-commerce is the development of trust on the side of the consumer. People develop trust in a business thr...
Michael A. Shepherd, Anil Dhonde, Carolyn R. Watte...
VLDB
2001
ACM
129views Database» more  VLDB 2001»
15 years 2 months ago
Similarity Search for Adaptive Ellipsoid Queries Using Spatial Transformation
Similarity retrieval mechanisms should utilize generalized quadratic form distance functions as well as the Euclidean distance function since ellipsoid queries parameters may vary...
Yasushi Sakurai, Masatoshi Yoshikawa, Ryoji Kataok...
« Prev « First page 2470 / 2532 Last » Next »