Sciweavers

1582 search results - page 304 / 317
» Qualitative Representation of Change
Sort
View
DIMVA
2008
13 years 9 months ago
Embedded Malware Detection Using Markov n-Grams
Embedded malware is a recently discovered security threat that allows malcode to be hidden inside a benign file. It has been shown that embedded malware is not detected by commerci...
M. Zubair Shafiq, Syed Ali Khayam, Muddassar Faroo...
AAAI
2004
13 years 9 months ago
Mixed-Initiative Workflow Composition
CAT's knowledge base contains abstract task or example "abstract flight reservation task," which can be included in a workflow as placeholders. CAT will gest that us...
Marc Spraragen
ISCAPDCS
2001
13 years 9 months ago
End-user Tools for Application Performance Analysis Using Hardware Counters
One purpose of the end-user tools described in this paper is to give users a graphical representation of performance information that has been gathered by instrumenting an applica...
Kevin S. London, Jack Dongarra, Shirley Moore, Phi...
SIP
2003
13 years 9 months ago
Polyphase Antialiasing in Enlargements
Changing resolution of images is a common operation. It is also common to use simple, i.e., small interpolation kernels satisfying some ”smoothness” qualities that are determi...
Daniel Seidner
VCIP
2003
126views Communications» more  VCIP 2003»
13 years 9 months ago
Media handling for visual information retrieval in VizIR
This paper describes how the handling of visual media objects is implemented in the visual information retrieval project VizIR. Essentially, four areas are concerned: media access...
Horst Eidenberger