Sciweavers

4120 search results - page 805 / 824
» Exploring ocean data
Sort
View
IJDE
2006
95views more  IJDE 2006»
13 years 9 months ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum
COMPUTING
2007
122views more  COMPUTING 2007»
13 years 9 months ago
Error estimation for Bregman iterations and inverse scale space methods in image restoration
In this paper we consider error estimation for image restoration problems based on generalized Bregman distances. This error estimation technique has been used to derive convergen...
Martin Burger, E. Resmerita, Lin He
JAIR
2008
93views more  JAIR 2008»
13 years 9 months ago
Spectrum of Variable-Random Trees
In this paper, we show that a continuous spectrum of randomisation exists, in which most existing tree randomisations are only operating around the two ends of the spectrum. That ...
Fei Tony Liu, Kai Ming Ting, Yang Yu, Zhi-Hua Zhou
CORR
2007
Springer
100views Education» more  CORR 2007»
13 years 9 months ago
Identifying statistical dependence in genomic sequences via mutual information estimates
Questions of understanding and quantifying the representation and amount of information in organisms have become a central part of biological research, as they potentially hold th...
H. M. Aktulga, I. Kontoyiannis, L. A. Lyznik, Luka...
ISF
2006
118views more  ISF 2006»
13 years 9 months ago
Does information security attack frequency increase with vulnerability disclosure? An empirical analysis
Abstract Research in information security, risk management and investment has grown in importance over the last few years. However, without reliable estimates on attack probabiliti...
Ashish Arora, Anand Nandkumar, Rahul Telang