Sciweavers

2015 search results - page 29 / 403
» Hidden Software Capabilities
Sort
View
ICMCS
2006
IEEE
344views Multimedia» more  ICMCS 2006»
14 years 3 months ago
Pattern Mining in Visual Concept Streams
Pattern mining algorithms are often much easier applied than quantitatively assessed. In this paper we address the pattern evaluation problem by looking at both the capability of ...
Lexing Xie, Shih-Fu Chang
TIT
1998
79views more  TIT 1998»
13 years 8 months ago
Capacity of Two-Layer Feedforward Neural Networks with Binary Weights
— The lower and upper bounds for the information capacity of two-layer feedforward neural networks with binary interconnections, integer thresholds for the hidden units, and zero...
Chuanyi Ji, Demetri Psaltis
CCS
2009
ACM
14 years 3 months ago
English shellcode
History indicates that the security community commonly takes a divide-and-conquer approach to battling malware threats: identify the essential and inalienable components of an att...
Joshua Mason, Sam Small, Fabian Monrose, Greg MacM...
BMCBI
2008
155views more  BMCBI 2008»
13 years 9 months ago
Prediction of regulatory elements in mammalian genomes using chromatin signatures
Background: Recent genomic scale survey of epigenetic states in the mammalian genomes has shown that promoters and enhancers are correlated with distinct chromatin signatures, pro...
Kyoung-Jae Won, Iouri Chepelev, Bing Ren, Wei Wang
AOSE
2006
Springer
13 years 11 months ago
An Agent-Environment Interaction Model
This paper develops a model for precisely defining how an agent interacts with objects in its environment through the use of its capabilities. Capabilities are recursively defined ...
Scott A. DeLoach, Jorge L. Valenzuela