Sciweavers

208 search results - page 7 / 42
» How NOT to review a paper: the tools and techniques of the a...
Sort
View
CORR
2010
Springer
151views Education» more  CORR 2010»
13 years 6 months ago
A Comprehensive Survey of Data Mining-based Fraud Detection Research
This survey paper categorises, compares, and summarises from almost all published technical and review articles in automated fraud detection within the last 10 years. It defines t...
Clifton Phua, Vincent C. S. Lee, Kate Smith-Miles,...
BWCCA
2010
13 years 2 months ago
Malware Obfuscation Techniques: A Brief Survey
As the obfuscation is widely used by malware writers to evade antivirus scanners, so it becomes important to analyze how this technique is applied to malwares. This paper explores ...
Ilsun You, Kangbin Yim
MVA
2008
201views Computer Vision» more  MVA 2008»
13 years 7 months ago
How close are we to solving the problem of automated visual surveillance?
The problem of automated visual surveillance has spawned a lively research area, with 2005 seeing three conferences or workshops and special issues of two major journals devoted to...
Hannah M. Dee, Sergio A. Velastin
AAMAS
2002
Springer
13 years 7 months ago
Game Theory and Decision Theory in Multi-Agent Systems
In the last few years, there has been increasing interest from the agent community in the use of techniques from decision theory and game theory. Our aims in this article are first...
Simon Parsons, Michael Wooldridge
WCRE
1999
IEEE
13 years 11 months ago
A Framework for Classifying and Comparing Software Reverse Engineering and Design Recovery Techniques
Several techniques have been suggested for supporting reverse engineering and design recovery activities. While many of these techniques have been cataloged in various collections...
Gerald C. Gannod, Betty H. C. Cheng