Sciweavers

1621 search results - page 204 / 325
» Detecting Experiences from Weblogs
Sort
View
AVSS
2007
IEEE
14 years 2 months ago
Towards robust face recognition for Intelligent-CCTV based surveillance using one gallery image
In recent years, the use of Intelligent Closed-Circuit Television (ICCTV) for crime prevention and detection has attracted significant attention. Existing face recognition system...
Ting Shan, Shaokang Chen, Conrad Sanderson, Brian ...
PSIVT
2007
Springer
245views Multimedia» more  PSIVT 2007»
14 years 2 months ago
Grayscale Template-Matching Invariant to Rotation, Scale, Translation, Brightness and Contrast
In this paper, we consider the grayscale template-matching problem, invariant to rotation, scale, translation, brightness and contrast, without previous operations that discard gra...
Hae Yong Kim, Sidnei Alves de Araújo
ACSAC
2006
IEEE
14 years 2 months ago
PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware
Modern malware often hide the malicious portion of their program code by making it appear as data at compiletime and transforming it back into executable code at runtime. This obf...
Paul Royal, Mitch Halpin, David Dagon, Robert Edmo...
DASC
2006
IEEE
14 years 2 months ago
On Recognizing Virtual Honeypots and Countermeasures
— Honeypots are decoys designed to trap, delay, and gather information about attackers. We can use honeypot logs to analyze attackers’ behaviors and design new defenses. A virt...
Xinwen Fu, Wei Yu, Dan Cheng, Xuejun Tan, Kevin St...
CSB
2005
IEEE
126views Bioinformatics» more  CSB 2005»
14 years 1 months ago
Discover True Association Rates in Multi-protein Complex Proteomics Data Sets
Experimental processes to collect and process proteomics data are increasingly complex, while the computational methods to assess the quality and significance of these data remain...
Changyu Shen, Lang Li, Jake Yue Chen