Sciweavers

160 search results - page 28 / 32
» Selecting the best strategy in a software certification proc...
Sort
View
KDD
2004
ACM
330views Data Mining» more  KDD 2004»
14 years 8 months ago
Learning to detect malicious executables in the wild
In this paper, we describe the development of a fielded application for detecting malicious executables in the wild. We gathered 1971 benign and 1651 malicious executables and enc...
Jeremy Z. Kolter, Marcus A. Maloof
BMCBI
2008
153views more  BMCBI 2008»
13 years 7 months ago
GAPscreener: An automatic tool for screening human genetic association literature in PubMed using the support vector machine tec
Background: Synthesis of data from published human genetic association studies is a critical step in the translation of human genome discoveries into health applications. Although...
Wei Yu, Melinda Clyne, Siobhan M. Dolan, Ajay Yesu...
ISARCS
2010
240views Hardware» more  ISARCS 2010»
13 years 9 months ago
Engineering a Distributed e-Voting System Architecture: Meeting Critical Requirements
Voting is a critical component of any democratic process; and electronic voting systems should be developed following best practices for critical system development. E-voting has i...
J. Paul Gibson, Eric Lallet, Jean-Luc Raffy
CGF
2004
86views more  CGF 2004»
13 years 7 months ago
Procedural Texture Matching and Transformation
We present a technique for creating a smoothly varying sequence of procedural textures that interpolates between arbitrary input samples of texture. This texture transformation us...
Eric Bourque, Gregory Dudek
BMCBI
2010
268views more  BMCBI 2010»
13 years 7 months ago
A high-level 3D visualization API for Java and ImageJ
Background: Current imaging methods such as Magnetic Resonance Imaging (MRI), Confocal microscopy, Electron Microscopy (EM) or Selective Plane Illumination Microscopy (SPIM) yield...
Benjamin Schmid, Johannes E. Schindelin, Albert Ca...