Sciweavers

1636 search results - page 16 / 328
» Detecting similar software applications
Sort
View
CAIP
2001
Springer
166views Image Analysis» more  CAIP 2001»
14 years 1 months ago
Application of Adaptive Hypergraph Model to Impulsive Noise Detection
In this paper, using hypergraph theory, we introduce an image model called Adaptive Image Neighborhood Hypergraph (AINH). From this model we propose a combinatorial definition of ...
Soufiane Rital, Alain Bretto, Driss Aboutajdine, H...
ICSM
2006
IEEE
14 years 2 months ago
Guiding the Application of Design Patterns Based on UML Models
Software design patterns are documented best practice solutions that can be applied to reoccurring problems. Although well documented, there are often opportunities to apply them ...
Lionel C. Briand, Yvan Labiche, Alexandre Sauve
IPOM
2009
Springer
14 years 3 months ago
Traffic Classification Based on Flow Similarity
Due to the various masquerading strategies adopted by newer P2P applications to avoid detection and filtering, well-known port mapping techniques cannot guarantee their accuracy an...
Jae Yoon Chung, Byungchul Park, Young J. Won, John...
ICMAS
2000
13 years 10 months ago
Using Similarity Criteria to Make Negotiation Trade-Offs
This paper addresses the issues involved in software agents making trade-offs during automated negotiations in which they have information uncertainty and resource limitations. In...
Peyman Faratin, Carles Sierra, Nicholas R. Jenning...
SDM
2008
SIAM
206views Data Mining» more  SDM 2008»
13 years 10 months ago
Latent Variable Mining with Its Applications to Anomalous Behavior Detection
In this paper, we propose a new approach to anomaly detection by looking at the latent variable space to make the first step toward latent anomaly detection. Most conventional app...
Shunsuke Hirose, Kenji Yamanishi