Sciweavers

2651 search results - page 521 / 531
» Mining Diversity on Networks
Sort
View
CIKM
2010
Springer
13 years 8 months ago
FacetCube: a framework of incorporating prior knowledge into non-negative tensor factorization
Non-negative tensor factorization (NTF) is a relatively new technique that has been successfully used to extract significant characteristics from polyadic data, such as data in s...
Yun Chi, Shenghuo Zhu
RAID
2010
Springer
13 years 8 months ago
An Analysis of Rogue AV Campaigns
Abstract. Rogue antivirus software has recently received extensive attention, justified by the diffusion and efficacy of its propagation. We present a longitudinal analysis of th...
Marco Cova, Corrado Leita, Olivier Thonnard, Angel...
WS
2010
ACM
13 years 8 months ago
Semantic web enabled software analysis
One of the most important decisions researchers face when analyzing software systems is the choice of a proper data analysis/exchange format. In this paper, we present EvoOnt, a s...
Jonas Tappolet, Christoph Kiefer, Abraham Bernstei...
CCS
2010
ACM
13 years 7 months ago
The limits of automatic OS fingerprint generation
Remote operating system fingerprinting relies on implementation differences between OSs to identify the specific variant executing on a remote host. Because these differences can ...
David W. Richardson, Steven D. Gribble, Tadayoshi ...
ICIP
2009
IEEE
13 years 7 months ago
Wyner-Ziv to H.264 video transcoder
-- This paper proposes a Wyner-Ziv / H.264 transcoder that enables low cost video applications. The proposed solution supports video encoding on resource constrained devices such a...
José Luis Martínez, Hari Kalva, Gera...