Sciweavers

2413 search results - page 372 / 483
» Understanding the problem
Sort
View
136
Voted
CVPR
2011
IEEE
14 years 7 months ago
Activity Recognition using Dynamic Subspace Angles
Cameras are ubiquitous everywhere and hold the promise of significantly changing the way we live and interact with our environment. Human activity recognition is central to under...
Octavia Camps, Mario Sznaier, Binlong Li, Teresa M...
ACNS
2011
Springer
244views Cryptology» more  ACNS 2011»
14 years 7 months ago
Quantitatively Analyzing Stealthy Communication Channels
Abstract. Attackers in particular botnet controllers use stealthy messaging systems to set up large-scale command and control. Understanding the capacity of such communication chan...
Patrick Butler, Kui Xu, Danfeng (Daphne) Yao
181
Voted
CAV
2011
Springer
216views Hardware» more  CAV 2011»
14 years 7 months ago
Malware Analysis with Tree Automata Inference
Abstract. The underground malware-based economy is flourishing and it is evident that the classical ad-hoc signature detection methods are becoming insufficient. Malware authors ...
Domagoj Babic, Daniel Reynaud, Dawn Song
CHI
2011
ACM
14 years 6 months ago
Modern software product support processes and the usage of multimedia formats
Despite being an important channel for end-user assistance, few studies have directly investigated the interactions that occur in modern-day practice of software product support. ...
Parmit K. Chilana, Tovi Grossman, George W. Fitzma...
JAMIA
2011
87views more  JAMIA 2011»
14 years 6 months ago
Can poison control data be used for pharmaceutical poisoning surveillance?
the title of a report to view the full citation and abstract. s of these reports are available now 169 unique articles this week Age: Adolescents A closer look at co-rumination: Ge...
Christopher A. Naun, Cody S. Olsen, J. Michael Dea...