Sciweavers

459 search results - page 76 / 92
» Detecting induced subgraphs
Sort
View
CCS
2008
ACM
13 years 9 months ago
Ether: malware analysis via hardware virtualization extensions
Malware has become the centerpiece of most security threats on the Internet. Malware analysis is an essential technology that extracts the runtime behavior of malware, and supplie...
Artem Dinaburg, Paul Royal, Monirul I. Sharif, Wen...
ICPR
2006
IEEE
14 years 8 months ago
Learning Policies for Efficiently Identifying Objects of Many Classes
Viola and Jones (VJ) cascade classification methods have proven to be very successful in detecting objects belonging to a single class -- e.g., faces. This paper addresses the mor...
Ahmed M. Elgammal, Ramana Isukapalli, Russell Grei...
ACL
2010
13 years 5 months ago
Hunting for the Black Swan: Risk Mining from Text
In the business world, analyzing and dealing with risk permeates all decisions and actions. However, to date, risk identification, the first step in the risk management cycle, has...
Jochen L. Leidner, Frank Schilder
KDD
2007
ACM
201views Data Mining» more  KDD 2007»
14 years 7 months ago
Structural and temporal analysis of the blogosphere through community factorization
The blogosphere has unique structural and temporal properties since blogs are typically used as communication media among human individuals. In this paper, we propose a novel tech...
Yun Chi, Shenghuo Zhu, Xiaodan Song, Jun'ichi Tate...
SIGMOD
2010
ACM
196views Database» more  SIGMOD 2010»
13 years 11 months ago
Connected substructure similarity search
Substructure similarity search is to retrieve graphs that approximately contain a given query graph. It has many applications, e.g., detecting similar functions among chemical com...
Haichuan Shang, Xuemin Lin, Ying Zhang, Jeffrey Xu...