Sciweavers

2642 search results - page 306 / 529
» Merge-by-Wire: Algorithms and System Support
Sort
View
CMS
2010
207views Communications» more  CMS 2010»
15 years 4 months ago
Statistical Detection of Malicious PE-Executables for Fast Offline Analysis
While conventional malware detection approaches increasingly fail, modern heuristic strategies often perform dynamically, which is not possible in many applications due to related ...
Ronny Merkel, Tobias Hoppe, Christian Krätzer...
ESWA
2006
243views more  ESWA 2006»
15 years 4 months ago
Knowledge based crime scenario modelling
A crucial concern in the evaluation of evidence related to a major crime is the formulation of sufficient alternative plausible scenarios that can explain the available evidence. ...
Jeroen Keppens, Burkhard Schafer
CGF
2007
135views more  CGF 2007»
15 years 4 months ago
Prediction of Individual Non-Linear Aging Trajectories of Faces
Represented in a Morphable Model, 3D faces follow curved trajectories in face space as they age. We present a novel algorithm that computes the individual aging trajectories for g...
Kristina Scherbaum, Martin Sunkel, Hans-Peter Seid...
CORR
2000
Springer
230views Education» more  CORR 2000»
15 years 3 months ago
Integrating E-Commerce and Data Mining: Architecture and Challenges
We show that the e-commerce domain can provide all the right ingredients for successful data mining. We describe an integrated architecture for supporting this integration. The ar...
Suhail Ansari, Ron Kohavi, Llew Mason, Zijian Zhen...
SIAMREV
2011
63views more  SIAMREV 2011»
14 years 6 months ago
Discrete Symbol Calculus
This paper deals with efficient numerical representation and manipulation of differential and integral operators as symbols in phase-space, i.e., functions of space x and frequen...
Laurent Demanet, Lexing Ying