Sciweavers

1332 search results - page 56 / 267
» ideas 2008
Sort
View
PST
2004
15 years 1 months ago
Detection of New Malicious Code Using N-grams Signatures
Signature-based malicious code detection is the standard technique in all commercial anti-virus software. This method can detect a virus only after the virus has appeared and cause...
Tony Abou-Assaleh, Nick Cercone, Vlado Keselj, Ray...
TREC
2004
15 years 1 months ago
THUIR at TREC 2004: QA
In this paper, we describe ideas and related experiments of Tsinghua University IR group in TREC 2004 QA track. In this track, our system consists three components: Question analy...
Wei Tan 0002, Qunxiu Chen, Shaoping Ma
TREC
2004
15 years 1 months ago
Juru at TREC 2004: Experiments with Prediction of Query Difficulty
Our experiments in the Robust track this year focused on predicting query difficulty and using this prediction for improving information retrieval. We developed two prediction alg...
Elad Yom-Tov, Shai Fine, David Carmel, Adam Darlow...
UAI
2004
15 years 1 months ago
Evidence-invariant Sensitivity Bounds
The sensitivities revealed by a sensitivity analysis of a probabilistic network typically depend on the entered evidence. For a real-life network therefore, the analysis is perfor...
Silja Renooij, Linda C. van der Gaag
VMV
2004
97views Visualization» more  VMV 2004»
15 years 1 months ago
Flexible Direct Multi-Volume Rendering in Dynamic Scenes
In this paper we describe methods to efficiently visualize multiple intersecting volumetric objects. We introduce the concept of V-Objects. V-Objects repbstract properties of an o...
Sören Grimm, Stefan Bruckner, Armin Kanitsar,...