Sciweavers

819 search results - page 89 / 164
» Fractal symbolic analysis
Sort
View
IIHMSP
2006
IEEE
137views Multimedia» more  IIHMSP 2006»
14 years 4 months ago
Understanding Human Behavior Using a Language Modeling Approach
Visual analysis of human behavior has generated considerable interest in the field of computer vision because of the wide spectrum of potential applications. In this paper, we pre...
Yu-Ming Liang, Sheng-Wen Shih, Arthur Chun-Chieh S...
GECCO
2009
Springer
134views Optimization» more  GECCO 2009»
14 years 2 months ago
Estimating the distribution and propagation of genetic programming building blocks through tree compression
Shin et al [19] and McKay et al [15] previously applied tree compression and semantics-based simplification to study the distribution of building blocks in evolving Genetic Progr...
Robert I. McKay, Xuan Hoai Nguyen, James R. Cheney...
DMIN
2006
239views Data Mining» more  DMIN 2006»
13 years 11 months ago
Mining of Stock Data: Intra- and Inter-Stock Pattern Associative Classification
In this paper, a pattern-based stock data mining approach which transforms the numeric stock data to symbolic sequences, carries out sequential and non-sequential association analy...
Jo Ting, Tak-Chung Fu, Fu-Lai Chung
CCS
2009
ACM
14 years 4 months ago
Computational soundness for key exchange protocols with symmetric encryption
Formal analysis of security protocols based on symbolic models has been very successful in finding flaws in published protocols and proving protocols secure, using automated too...
Ralf Küsters, Max Tuengerthal
SOSP
2007
ACM
14 years 6 months ago
Bouncer: securing software by blocking bad input
Attackers exploit software vulnerabilities to control or crash programs. Bouncer uses existing software instrumentation techniques to detect attacks and it generates filters auto...
Manuel Costa, Miguel Castro, Lidong Zhou, Lintao Z...