Sciweavers

985 search results - page 186 / 197
» On the validity of digital signatures
Sort
View
KDD
2009
ACM
181views Data Mining» more  KDD 2009»
14 years 5 days ago
Intelligent file scoring system for malware detection from the gray list
Currently, the most significant line of defense against malware is anti-virus products which focus on authenticating valid software from a white list, blocking invalid software f...
Yanfang Ye, Tao Li, Qingshan Jiang, Zhixue Han, Li...
SEMWEB
2001
Springer
14 years 1 days ago
The ICS-FORTH RDFSuite: Managing Voluminous RDF Description Bases
Metadata are widely used in order to fully exploit information resources available on corporate intranets or the Internet. The Resource Description Framework (RDF) aims at facilit...
Sofia Alexaki, Vassilis Christophides, Gregory Kar...
ASWEC
2000
IEEE
14 years 1 days ago
Implementing an Experience Factory Based on Existing Organizational Knowledge
This paper describes the development of an experience factory in an Australian organization involved in the field of telecommunications. Faced with improvement needs, in 1998 the ...
Arne Koennecker, D. Ross Jeffery, Graham C. Low
FGR
1996
IEEE
198views Biometrics» more  FGR 1996»
13 years 11 months ago
Towards 3D hand tracking using a deformable model
In this paper we rst describe how we have constructed a 3D deformable Point Distribution Model of the human hand, capturing training data semi-automatically from volume images via...
Tony Heap, David Hogg
ARGMAS
2007
Springer
13 years 11 months ago
Arguing and Explaining Classifications
Argumentation is a promising approach used by autonomous agents for reasoning about inconsistent knowledge, based on the construction and the comparison of arguments. In this pape...
Leila Amgoud, Mathieu Serrurier