Sciweavers

1814 search results - page 295 / 363
» Watermarking relational data: framework, algorithms and anal...
Sort
View
SP
2010
IEEE
140views Security Privacy» more  SP 2010»
15 years 3 months ago
Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries
Abstract—Unfortunately, malicious software is still an unsolved problem and a major threat on the Internet. An important component in the fight against malicious software is the...
Clemens Kolbitsch, Thorsten Holz, Christopher Krue...
NN
2002
Springer
14 years 10 months ago
Self-organizing maps with recursive neighborhood adaptation
Self-organizing maps (SOMs) are widely used in several fields of application, from neurobiology to multivariate data analysis. In that context, this paper presents variants of the...
John Aldo Lee, Michel Verleysen
EDBT
2008
ACM
120views Database» more  EDBT 2008»
15 years 11 months ago
Schema mapping verification: the spicy way
Schema mapping algorithms rely on value correspondences ? i.e., correspondences among semantically related attributes ? to produce complex transformations among data sources. Thes...
Angela Bonifati, Giansalvatore Mecca, Alessandro P...
ACCV
2009
Springer
15 years 5 months ago
From Ramp Discontinuities to Segmentation Tree
Abstract. This paper presents a new algorithm for low-level multiscale segmentation of images. The algorithm is designed to detect image regions regardless of their shapes, sizes, ...
Emre Akbas, Narendra Ahuja
IEEEPACT
2002
IEEE
15 years 4 months ago
Using the Compiler to Improve Cache Replacement Decisions
Memory performance is increasingly determining microprocessor performance and technology trends are exacerbating this problem. Most architectures use set-associative caches with L...
Zhenlin Wang, Kathryn S. McKinley, Arnold L. Rosen...