Sciweavers

271 search results - page 26 / 55
» Automatic analysis of malware behavior using machine learnin...
Sort
View
ISPASS
2006
IEEE
14 years 2 months ago
Comparing multinomial and k-means clustering for SimPoint
SimPoint is a technique used to pick what parts of the program’s execution to simulate in order to have a complete picture of execution. SimPoint uses data clustering algorithms...
Greg Hamerly, Erez Perelman, Brad Calder
CCS
2010
ACM
13 years 6 months ago
The limits of automatic OS fingerprint generation
Remote operating system fingerprinting relies on implementation differences between OSs to identify the specific variant executing on a remote host. Because these differences can ...
David W. Richardson, Steven D. Gribble, Tadayoshi ...
ICRA
2003
IEEE
123views Robotics» more  ICRA 2003»
14 years 2 months ago
Autonomous reactive control for simulated humanoids
— We present a framework for composing motor controllers into autonomous composite reactive behaviors for bipedal robots and autonomous, physically-simulated humanoids. A key con...
Petros Faloutsos, Michiel van de Panne, Demetri Te...
PAMI
2006
193views more  PAMI 2006»
13 years 8 months ago
A System for Learning Statistical Motion Patterns
Analysis of motion patterns is an effective approach for anomaly detection and behavior prediction. Current approaches for the analysis of motion patterns depend on known scenes, w...
Weiming Hu, Xuejuan Xiao, Zhouyu Fu, Dan Xie, Tien...
SSDBM
2006
IEEE
121views Database» more  SSDBM 2006»
14 years 2 months ago
Time Series Analysis Using the Concept of Adaptable Threshold Similarity
The issue of data mining in time series databases is of utmost importance for many practical applications and has attracted a lot of research in the past years. In this paper, we ...
Johannes Aßfalg, Hans-Peter Kriegel, Peer Kr...