Sciweavers

2633 search results - page 473 / 527
» Using Robust Methods for Automatic Extraction of Buildings
Sort
View
NDSS
2008
IEEE
15 years 4 months ago
HookFinder: Identifying and Understanding Malware Hooking Behaviors
Installing various hooks into the victim system is an important attacking strategy employed by malware, including spyware, rootkits, stealth backdoors, and others. In order to def...
Heng Yin, Zhenkai Liang, Dawn Song
ICMCS
2007
IEEE
155views Multimedia» more  ICMCS 2007»
15 years 4 months ago
Hidden Maximum Entropy Approach for Visual Concept Modeling
Recently, the bag-of-words approach has been successfully applied to automatic image annotation, object recognition, etc. The method needs to first quantize an image using the vis...
Sheng Gao, Joo-Hwee Lim, Qibin Sun
MM
2005
ACM
157views Multimedia» more  MM 2005»
15 years 3 months ago
Natural language processing of lyrics
We report experiments on the use of standard natural language processing (NLP) tools for the analysis of music lyrics. A significant amount of music audio has lyrics. Lyrics enco...
Jose P. G. Mahedero, Alvaro Martinez, Pedro Cano, ...
82
Voted
CLUSTER
2004
IEEE
15 years 1 months ago
A client-centric grid knowledgebase
Grid computing brings with it additional complexities and unexpected failures. Just keeping track of our jobs traversing different grid resources before completion can at times be...
George Kola, Tevfik Kosar, Miron Livny
111
Voted
AVI
2010
14 years 11 months ago
An architecture and a visual interface for tagging the 3D web
Content classification performed by end users is spreading through the web. Most of the work done so far is related to the hypermedia web. In spite of that, there is a growing mas...
Fabio Pittarello