Sciweavers

7623 search results - page 1490 / 1525
» Algorithmic Features of Eclat
Sort
View
KDD
2009
ACM
173views Data Mining» more  KDD 2009»
14 years 1 months ago
Malware detection using statistical analysis of byte-level file content
Commercial anti-virus software are unable to provide protection against newly launched (a.k.a “zero-day”) malware. In this paper, we propose a novel malware detection techniqu...
S. Momina Tabish, M. Zubair Shafiq, Muddassar Faro...
WASA
2009
Springer
103views Algorithms» more  WASA 2009»
14 years 1 months ago
Void Avoidance in Three-Dimensional Mobile Underwater Sensor Networks
Mobile underwater sensor networks are usually featured with three-dimensional topology, high node mobility and long propagation delays. For such networks, geographic routing has be...
Peng Xie, Zhong Zhou, Zheng Peng, Jun-Hong Cui, Zh...
CRYPTO
2000
Springer
151views Cryptology» more  CRYPTO 2000»
14 years 1 months ago
New Public-Key Cryptosystem Using Braid Groups
Abstract. The braid groups are infinite non-commutative groups naturally arising from geometric braids. The aim of this article is twofold. One is to show that the braid groups ca...
Ki Hyoung Ko, Sangjin Lee, Jung Hee Cheon, Jae Woo...
ICIP
1999
IEEE
14 years 28 days ago
Motion Segmentation with Level Sets
Segmentation of motion in an image sequence is one of the most challenging problems in image processing, while at the same time one that finds numerous applications. To date, a wea...
Abdol-Reza Mansouri, Janusz Konrad
ICNP
1999
IEEE
14 years 28 days ago
Automated Protocol Implementations Based on Activity Threads
In this paper we present a new approach for the automated mapping of formal descriptions into activity thread implementations. Our approach resolves semantic conflicts by reorderi...
Peter Langendörfer, Hartmut König
« Prev « First page 1490 / 1525 Last » Next »