Sciweavers

1134 search results - page 204 / 227
» Analyzing Mapping Extraction Approaches
Sort
View
SP
2010
IEEE
194views Security Privacy» more  SP 2010»
13 years 11 months ago
Identifying Dormant Functionality in Malware Programs
—To handle the growing flood of malware, security vendors and analysts rely on tools that automatically identify and analyze malicious code. Current systems for automated malwar...
Paolo Milani Comparetti, Guido Salvaneschi, Engin ...
WSC
2004
13 years 8 months ago
A Case Study in Meta-Simulation Design and Performance Analysis for Large-Scale Networks
Simulation and Emulation techniques are fundamental to aid the process of large-scale protocol design and network operations. However, the results from these techniques are often ...
David W. Bauer, Garrett R. Yaun, Christopher D. Ca...
3DOR
2008
13 years 8 months ago
A 3D Face Recognition Algorithm Using Histogram-based Features
We present an automatic face recognition approach, which relies on the analysis of the three-dimensional facial surface. The proposed approach consists of two basic steps, namely ...
Xuebing Zhou, Helmut Seibert, Christoph Busch, Wol...
CLEF
2010
Springer
13 years 8 months ago
Combination of Classifiers for Indoor Room Recognition CGS participation at ImageCLEF2010 Robot Vision Task
This paper represents a description of our approach to the problem of topological localization of a mobile robot using visual information. Our method has been developed for ImageCL...
Walter Lucetti, Emanuel Luchetti
BMCBI
2010
129views more  BMCBI 2010»
13 years 7 months ago
Automatic prediction of catalytic residues by modeling residue structural neighborhood
Background: Prediction of catalytic residues is a major step in characterizing the function of enzymes. In its simpler formulation, the problem can be cast into a binary classific...
Elisa Cilia, Andrea Passerini