Sciweavers

5675 search results - page 115 / 1135
» Exploiting Chaos for Computation
Sort
View
IJDE
2006
95views more  IJDE 2006»
15 years 4 months ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum
AAMAS
2005
Springer
15 years 4 months ago
Learning and Exploiting Relative Weaknesses of Opponent Agents
Agents in a competitive interaction can greatly benefit from adapting to a particular adversary, rather than using the same general strategy against all opponents. One method of s...
Shaul Markovitch, Ronit Reger
PAMI
2007
144views more  PAMI 2007»
15 years 3 months ago
Facial Action Unit Recognition by Exploiting Their Dynamic and Semantic Relationships
—A system that could automatically analyze the facial actions in real time has applications in a wide range of different fields. However, developing such a system is always chall...
Yan Tong, Wenhui Liao, Qiang Ji
CCS
2011
ACM
14 years 4 months ago
Fashion crimes: trending-term exploitation on the web
Online service providers are engaged in constant conflict with miscreants who try to siphon a portion of legitimate traffic to make illicit profits. We study the abuse of “tr...
Tyler Moore, Nektarios Leontiadis, Nicolas Christi...
CIKM
2011
Springer
14 years 4 months ago
Exploiting longer cycles for link prediction in signed networks
We consider the problem of link prediction in signed networks. Such networks arise on the web in a variety of ways when users can implicitly or explicitly tag their relationship w...
Kai-Yang Chiang, Nagarajan Natarajan, Ambuj Tewari...