Sciweavers

1282 search results - page 210 / 257
» A cost-benefit evaluation method for web-based information s...
Sort
View
KDD
2004
ACM
330views Data Mining» more  KDD 2004»
14 years 8 months ago
Learning to detect malicious executables in the wild
In this paper, we describe the development of a fielded application for detecting malicious executables in the wild. We gathered 1971 benign and 1651 malicious executables and enc...
Jeremy Z. Kolter, Marcus A. Maloof
EDBT
2008
ACM
146views Database» more  EDBT 2008»
14 years 7 months ago
Attribute selection in multivariate microaggregation
Microaggregation is one of the most employed microdata protection methods. The idea is to build clusters of at least k original records, and then replace them with the centroid of...
Javier Herranz, Jordi Nin, Vicenç Torra
IUI
2010
ACM
14 years 4 months ago
Aspect-level news browsing: understanding news events from multiple viewpoints
Aspect-level news browsing provides readers with a classified view of news articles with different viewpoints. It facilitates active interactions with which readers easily discove...
Souneil Park, Sang Jeong Lee, Junehwa Song
ICMCS
2008
IEEE
206views Multimedia» more  ICMCS 2008»
14 years 2 months ago
Redundant motion vectors for improved error resilience in H.264/AVC coded video
This proposal presents a new error robust strategy for encoding redundant pictures for the H.264/AVC standard. The method is based on providing motion vectors as redundant data, i...
Maheshi B. Dissanayake, Chaminda T. E. R. Hewage, ...
AMFG
2007
IEEE
328views Biometrics» more  AMFG 2007»
14 years 2 months ago
Fusing Gabor and LBP Feature Sets for Kernel-Based Face Recognition
Extending recognition to uncontrolled situations is a key challenge for practical face recognition systems. Finding efficient and discriminative facial appearance descriptors is c...
Xiaoyang Tan, Bill Triggs