Sciweavers

18451 search results - page 3565 / 3691
» Selecting the
Sort
View
JMLR
2006
132views more  JMLR 2006»
13 years 9 months ago
Learning to Detect and Classify Malicious Executables in the Wild
We describe the use of machine learning and data mining to detect and classify malicious executables as they appear in the wild. We gathered 1,971 benign and 1,651 malicious execu...
Jeremy Z. Kolter, Marcus A. Maloof
ENGL
2007
101views more  ENGL 2007»
13 years 9 months ago
Multiresolution Knowledge Mining using Wavelet Transform
— Most research in Knowledge Mining deal with the basic models like clustering, classification, regression, association rule mining and so on. In the process of quest for knowled...
R. Pradeep Kumar, P. Nagabhushan
ENGL
2007
73views more  ENGL 2007»
13 years 9 months ago
Cognitive Design Features on Traffic Signs
—The success of effective communication of traffic sign messages to road users may not only relate to the user characteristics but also the signs themselves. The purpose of this ...
Annie W. Y. Ng, Alan H. S. Chan
ENGL
2007
130views more  ENGL 2007»
13 years 9 months ago
Wavelet Based Classification for Cancer Diagnosis
— We make use of discrete wavelets to extract distinguishing features between normal and cancerous human breast tissue fluorescence spectra. These are then used in conjunction wi...
Bhadra Mani, C. Raghavendra Rao, P. Anantha Lakshm...
JODL
2006
131views more  JODL 2006»
13 years 9 months ago
Keyframe-based video summarization using Delaunay clustering
Recent advances in technology have made tremendous amount of multimedia information available to the general population. An efficient way of dealing with this new development is t...
Padmavathi Mundur, Yong Rao, Yelena Yesha
« Prev « First page 3565 / 3691 Last » Next »