Sciweavers

988 search results - page 23 / 198
» Positive Results and Techniques for Obfuscation
Sort
View
EWSN
2009
Springer
14 years 3 months ago
SCOPES: Smart Cameras Object Position Estimation System
In this paper we present SCOPES, a distributed Smart Camera Object Position Estimation sensor network System that provides maps of distribution of people in indoors environments. ...
Ankur Kamthe, Lun Jiang, Matthew Dudys, Alberto Ce...
BIBE
2007
IEEE
195views Bioinformatics» more  BIBE 2007»
14 years 3 months ago
Finding Clusters of Positive and Negative Coregulated Genes in Gene Expression Data
— In this paper, we propose a system for finding partial positive and negative coregulated gene clusters in microarray data. Genes are clustered together if they show the same p...
Kerstin Koch, Stefan Schönauer, Ivy Jansen, J...
ICMCS
2006
IEEE
139views Multimedia» more  ICMCS 2006»
14 years 2 months ago
A Measure for Evaluating Retrieval Techniques based on Partially Ordered Ground Truth Lists
For the RISM A/II collection of musical incipits (short extracts of scores, taken from the beginning), we have established a ground truth based on the opinions of human experts. I...
Rainer Typke, Remco C. Veltkamp, Frans Wiering
ICSM
2007
IEEE
14 years 3 months ago
Matching Control Flow of Program Versions
In many application areas, including piracy detection, software debugging and maintenance, situations arise in which there is a need for comparing two versions of a program that d...
Vijayanand Nagarajan, Rajiv Gupta, Matias Madou, X...
CCS
2008
ACM
13 years 10 months ago
Ether: malware analysis via hardware virtualization extensions
Malware has become the centerpiece of most security threats on the Internet. Malware analysis is an essential technology that extracts the runtime behavior of malware, and supplie...
Artem Dinaburg, Paul Royal, Monirul I. Sharif, Wen...