Sciweavers

476 search results - page 55 / 96
» Analysis of signature change patterns
Sort
View
IJNSEC
2006
96views more  IJNSEC 2006»
13 years 8 months ago
A Memory Symptom-based Virus Detection Approach
The widespread use of the Internet has caused computer security to become an important issue. Currently, antivirus software is the primary mechanism that prevents computers from t...
Hsien-Chou Liao, Yi-Hsiang Wang
IROS
2006
IEEE
148views Robotics» more  IROS 2006»
14 years 2 months ago
Environment Understanding: Robust Feature Extraction from Range Sensor Data
— This paper proposes an approach allowing indoor environment supervised learning to recognize relevant features for environment understanding. Stochastic preprocessing methods i...
Antonio Romeo, Luis Montano
CLEF
2005
Springer
14 years 2 months ago
A Full Data-Driven System for Multiple Language Question Answering
Abstract. This paper describes a full data-driven system for question answering. The system uses pattern matching and statistical techniques to identify the relevant passages as we...
Manuel Montes-y-Gómez, Luis Villaseñ...
DPPI
2003
ACM
14 years 2 months ago
Only when miss universe snatches me: teasing in MMS messaging
When new technology is adopted to everyday life, existing patterns of behavior relevant to the application are transferred to this new media. In this process, some things will als...
Esko Kurvinen
PRL
1998
85views more  PRL 1998»
13 years 8 months ago
Large encrypting binary images with higher security
In this paper, we present a new approach for encrypting binary images. Putting different scan patterns at the same level in Ž .the scan tree structure and employing a two-dimensi...
Kuo-Liang Chung, Lung-Chun Chang