Sciweavers

199 search results - page 31 / 40
» Developing an Immunity to Spam
Sort
View
DIMVA
2008
13 years 9 months ago
FluXOR: Detecting and Monitoring Fast-Flux Service Networks
Botnets are large groups of compromised machines (bots) used by miscreants for the most illegal activities (e.g., sending spam emails, denial-of-service attacks, phishing and other...
Emanuele Passerini, Roberto Paleari, Lorenzo Marti...
SDM
2007
SIAM
73views Data Mining» more  SDM 2007»
13 years 9 months ago
Sketching Landscapes of Page Farms
The Web is a very large social network. It is important and interesting to understand the “ecology” of the Web: the general relations of Web pages to their environment. The un...
Bin Zhou 0002, Jian Pei
ECCV
2008
Springer
15 years 6 months ago
Detecting Carried Objects in Short Video Sequences
We propose a new method for detecting objects such as bags carried by pedestrians depicted in short video sequences. In common with earlier work on the same problem, the method sta...
Dima Damen, David Hogg
ISBI
2004
IEEE
14 years 8 months ago
Noise Analysis for Diffraction Enhanced Imaging
Herein we present a quantitative noise analysis of diffraction enhanced imaging (DEI), an x-ray imaging method that produces absorption and refraction images, with inherent immuni...
Miles N. Wernick, Jovan G. Brankov, Alejandro Saiz...
ICARIS
2009
Springer
14 years 2 months ago
Exploration of the Dendritic Cell Algorithm Using the Duration Calculus
As one of the newest members in Artificial Immune Systems (AIS), the Dendritic Cell Algorithm (DCA) has been applied to a range of problems. These applications mainly belong to th...
Feng Gu, Julie Greensmith, Uwe Aickelin