Sciweavers

688 search results - page 94 / 138
» Identifying Clusters from Positive Data
Sort
View
ICC
2007
IEEE
141views Communications» more  ICC 2007»
14 years 4 months ago
A Hybrid Model to Detect Malicious Executables
— We present a hybrid data mining approach to detect malicious executables. In this approach we identify important features of the malicious and benign executables. These feature...
Mohammad M. Masud, Latifur Khan, Bhavani M. Thurai...
ICMLA
2008
13 years 11 months ago
Automated Analysis for Detecting Beams in Laser Wakefield Simulations
Laser wakefield particle accelerators have shown the potential to generate electric fields thousands of times higher than those of conventional accelerators. The resulting extreme...
Daniela Mayumi Ushizima, Oliver Rübel, Prabha...
BMCBI
2006
124views more  BMCBI 2006»
13 years 10 months ago
Predicting transcription factor binding sites using local over-representation and comparative genomics
Background: Identifying cis-regulatory elements is crucial to understanding gene expression, which highlights the importance of the computational detection of overrepresented tran...
Matthieu Defrance, Hélène Touzet
DAIS
2009
13 years 11 months ago
Exploiting Synergies between Coexisting Overlays
Overlay networks have emerged as a powerful paradigm to realise a large range of distributed services. However, as the number of overlays grows and the systems that use them become...
Shen Lin 0003, François Taïani, Gordon...
GRAPHICSINTERFACE
2008
13 years 11 months ago
SurfaceFusion: unobtrusive tracking of everyday objects in tangible user interfaces
Interactive surfaces and related tangible user interfaces often involve everyday objects that are identified, tracked, and augmented with digital information. Traditional approach...
Alex Olwal, Andrew D. Wilson