Sciweavers

6812 search results - page 1331 / 1363
» Detection of Information Flows
Sort
View
TRECVID
2008
13 years 9 months ago
The Lowlands Team at TRECVID 2008
Id: trecvid2008.tex 197 2008-10-23 13:28:48Z alyr Date: 2008-10-23 15:28:48 +0200 (Thu, 23 Oct 2008) Type Run Description MAP/mean infAP HLF Official H utcwiprimw146 Our prelimina...
Robin Aly, Djoerd Hiemstra, Arjen P. de Vries, Hen...
AAAI
2006
13 years 9 months ago
Salience in Orientation-Filter Response Measured as Suspicious Coincidence in Natural Images
Visual cortex neurons have receptive fields resembling oriented bandpass filters, and their response distributions on natural images are non-Gaussian. Inspired by this, we previou...
Subramonia Sarma, Yoonsuck Choe
CMS
2006
13 years 9 months ago
TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation
Abstract. Sophisticated worms that use precomputed hitlists of vulnerable targets are especially hard to contain, since they are harder to detect, and spread at rates where even au...
Spyros Antonatos, Kostas G. Anagnostakis
ESANN
2004
13 years 9 months ago
Neural networks for data mining: constrains and open problems
When we talk about using neural networks for data mining we have in mind the original data mining scope and challenge. How did neural networks meet this challenge? Can we run neura...
Razvan Andonie, Boris Kovalerchuk
FAST
2004
13 years 9 months ago
Tracefs: A File System to Trace Them All
File system traces have been used for years to analyze user behavior and system software behavior, leading to advances in file system and storage technologies. Existing traces, ho...
Akshat Aranya, Charles P. Wright, Erez Zadok
« Prev « First page 1331 / 1363 Last » Next »