Sciweavers

437 search results - page 32 / 88
» An Effective Promoter Detection Method using the Adaboost Al...
Sort
View
CIKM
2008
Springer
13 years 9 months ago
Achieving both high precision and high recall in near-duplicate detection
To find near-duplicate documents, fingerprint-based paradigms such as Broder's shingling and Charikar's simhash algorithms have been recognized as effective approaches a...
Lian'en Huang, Lei Wang, Xiaoming Li
CORR
2010
Springer
206views Education» more  CORR 2010»
13 years 7 months ago
Detecting Anomalous Process Behaviour using Second Generation Artificial Immune Systems
Abstract. Artificial immune systems (AISs) are problem-solving systems inspired by the biological immune system. They have been successfully applied to a number of problem domains ...
Jamie Twycross, Uwe Aickelin, Amanda M. Whitbrook
AVSS
2006
IEEE
14 years 1 months ago
Real-Time Detection of Camera Tampering
This paper presents a novel technique for camera tampering detection. It is implemented in real-time and was developed for use in surveillance and security applications. This meth...
Evan Ribnick, Stefan Atev, Osama Masoud, Nikolaos ...
ICRA
2006
IEEE
174views Robotics» more  ICRA 2006»
14 years 1 months ago
Multi-scale point and line range data algorithms for mapping and localization
— This paper presents a multi-scale point and line based representation of two-dimensional range scan data. The techniques are based on a multi-scale Hough transform and a tree r...
Samuel T. Pfister, Joel W. Burdick
PLDI
2009
ACM
14 years 2 months ago
TAJ: effective taint analysis of web applications
Taint analysis, a form of information-flow analysis, establishes whether values from untrusted methods and parameters may flow into security-sensitive operations. Taint analysis...
Omer Tripp, Marco Pistoia, Stephen J. Fink, Manu S...