Sciweavers

1621 search results - page 175 / 325
» Detecting Experiences from Weblogs
Sort
View
CCS
2008
ACM
13 years 10 months ago
Ether: malware analysis via hardware virtualization extensions
Malware has become the centerpiece of most security threats on the Internet. Malware analysis is an essential technology that extracts the runtime behavior of malware, and supplie...
Artem Dinaburg, Paul Royal, Monirul I. Sharif, Wen...
CVIU
2008
124views more  CVIU 2008»
13 years 8 months ago
Measuring novelty and redundancy with multiple modalities in cross-lingual broadcast news
News videos from different channels, languages are broadcast everyday, which provide abundant information for users. To effectively search, retrieve, browse and track news stories...
Xiao Wu, Alexander G. Hauptmann, Chong-Wah Ngo
BMCBI
2005
152views more  BMCBI 2005»
13 years 8 months ago
Improved profile HMM performance by assessment of critical algorithmic features in SAM and HMMER
Background: Profile hidden Markov model (HMM) techniques are among the most powerful methods for protein homology detection. Yet, the critical features for successful modelling ar...
Markus Wistrand, Erik L. L. Sonnhammer
MICRO
2008
IEEE
159views Hardware» more  MICRO 2008»
14 years 2 months ago
Copy or Discard execution model for speculative parallelization on multicores
The advent of multicores presents a promising opportunity for speeding up sequential programs via profile-based speculative parallelization of these programs. In this paper we pr...
Chen Tian, Min Feng, Vijay Nagarajan, Rajiv Gupta
WSCG
2004
137views more  WSCG 2004»
13 years 9 months ago
Robust Range Image Registration using a Common Plane
This paper presents a method for the registration of range image pairs that were captured from different locations. The proposed approach assumes that a common 3D plane is least v...
Joachim Bauer, Konrad F. Karner, Andreas Klaus, Ro...