Sciweavers

2415 search results - page 354 / 483
» Markov Processes on Curves
Sort
View
KDD
2004
ACM
330views Data Mining» more  KDD 2004»
14 years 9 months ago
Learning to detect malicious executables in the wild
In this paper, we describe the development of a fielded application for detecting malicious executables in the wild. We gathered 1971 benign and 1651 malicious executables and enc...
Jeremy Z. Kolter, Marcus A. Maloof
VLDB
2007
ACM
118views Database» more  VLDB 2007»
14 years 9 months ago
Eliminating Impedance Mismatch in C++
Recently, the C# and the VISUAL BASIC communities were tantalized by the advent of LINQ [18]--the Language INtegrated Query technology from Microsoft. LINQ represents a set of lan...
Joseph Gil, Keren Lenz
CSSE
2008
IEEE
14 years 3 months ago
An Efficient Algorithm for Skew-Correction of Document Image Based on Cyclostyle Matching
—The skew-correction of scanned document image is a necessary step undergone before some processing. For the purpose of practical, robust, real-time of the algorithm, this paper ...
Liang Junjuan, Tan Guoxin
ISCAS
2008
IEEE
120views Hardware» more  ISCAS 2008»
14 years 3 months ago
A hybrid CMOS APS pixel for wide-dynamic range imaging applications
— In this paper, a new hybrid photodiode-photogate (HPDPG) CMOS APS pixel for high-dynamic range imaging applications is presented. The HPDPG pixel composes of a biased photogate...
Suat U. Ay
SECURWARE
2008
IEEE
14 years 3 months ago
A Body-Centered Cubic Method for Key Agreement in Dynamic Mobile Ad Hoc Networks
Mobile ad hoc networking is an operating mode for rapid mobile host interconnection, where nodes rely on each other, in order to maintain network connectivity and functionality. S...
Ioannis G. Askoxylakis, Damien Sauveron, Constanti...