Sciweavers

980 search results - page 128 / 196
» On Negative Bases
Sort
View
SCIA
2009
Springer
132views Image Analysis» more  SCIA 2009»
14 years 3 months ago
Instant Action Recognition
In this paper, we present an efficient system for action recognition from very short sequences. For action recognition typically appearance and/or motion information of an action ...
Thomas Mauthner, Peter M. Roth, Horst Bischof
ACSAC
2008
IEEE
14 years 3 months ago
Soft-Timer Driven Transient Kernel Control Flow Attacks and Defense
A new class of stealthy kernel-level malware, called transient kernel control flow attacks, uses dynamic soft timers to achieve significant work while avoiding any persistent ch...
Jinpeng Wei, Bryan D. Payne, Jonathon Giffin, Calt...
ACSAC
2008
IEEE
14 years 3 months ago
XSSDS: Server-Side Detection of Cross-Site Scripting Attacks
Cross-site Scripting (XSS) has emerged to one of the most prevalent type of security vulnerabilities. While the reason for the vulnerability primarily lies on the serverside, the ...
Martin Johns, Björn Engelmann, Joachim Posegg...
ICDM
2008
IEEE
108views Data Mining» more  ICDM 2008»
14 years 3 months ago
Non-negative Matrix Factorization on Manifold
Recently Non-negative Matrix Factorization (NMF) has received a lot of attentions in information retrieval, computer vision and pattern recognition. NMF aims to find two non-nega...
Deng Cai, Xiaofei He, Xiaoyun Wu, Jiawei Han
ICDM
2008
IEEE
183views Data Mining» more  ICDM 2008»
14 years 3 months ago
Collaborative Filtering for Implicit Feedback Datasets
A common task of recommender systems is to improve customer experience through personalized recommendations based on prior implicit feedback. These systems passively track differe...
Yifan Hu, Yehuda Koren, Chris Volinsky