Sciweavers

4307 search results - page 857 / 862
» Dynamic Spyware Analysis
Sort
View
CN
2006
124views more  CN 2006»
13 years 7 months ago
Session based access control in geographically replicated Internet services
Performance critical services over Internet often rely on geographically distributed architectures of replicated servers. Content Delivery Networks (CDN) are a typical example whe...
Novella Bartolini
DATAMINE
2006
176views more  DATAMINE 2006»
13 years 7 months ago
A Bit Level Representation for Time Series Data Mining with Shape Based Similarity
Clipping is the process of transforming a real valued series into a sequence of bits representing whether each data is above or below the average. In this paper, we argue that clip...
Anthony J. Bagnall, Chotirat (Ann) Ratanamahatana,...
BMCBI
2007
187views more  BMCBI 2007»
13 years 7 months ago
BioWMS: a web-based Workflow Management System for bioinformatics
Background: An in-silico experiment can be naturally specified as a workflow of activities implementing, in a standardized environment, the process of data and control analysis. A...
Ezio Bartocci, Flavio Corradini, Emanuela Merelli,...
CCE
2007
13 years 7 months ago
A systematic approach for soft sensor development
This paper presents a systematic approach based on robust statistical techniques for development of a data-driven soft sensor, which is an important component of the process analy...
Bao Lin, Bodil Recke, Jørgen K. H. Knudsen,...
IJCV
2006
125views more  IJCV 2006»
13 years 7 months ago
Robust Tracking Using Foreground-Background Texture Discrimination
This paper conceives of tracking as the developing distinction of a foreground against the background. In this manner, fast changes in the object or background appearance can be de...
Hieu Tat Nguyen, Arnold W. M. Smeulders