Sciweavers

3689 search results - page 590 / 738
» The Branding Analysis Pattern
Sort
View
134
Voted
ACSAC
2007
IEEE
15 years 10 months ago
MetaAware: Identifying Metamorphic Malware
Detection of malicious software (malware) by the use of static signatures is often criticized for being overly simplistic. Available methods of obfuscating code (so-called metamor...
Qinghua Zhang, Douglas S. Reeves
AMFG
2007
IEEE
315views Biometrics» more  AMFG 2007»
15 years 10 months ago
Structured Ordinal Features for Appearance-Based Object Representation
In this paper, we propose a novel appearance-based representation, called Structured Ordinal Feature (SOF). SOF is a binary string encoded by combining eight ordinal blocks in a ci...
ShengCai Liao, Zhen Lei, Stan Z. Li, Xiaotong Yuan...
ESCIENCE
2007
IEEE
15 years 10 months ago
Community Training: Partitioning Schemes in Good Shape for Federated Data Grids
In federated Data Grids, individual institutions share their data sets within a community to enable collaborative data analysis. Data access needs to be provided in a scalable fas...
Tobias Scholl, Richard Kuntschke, Angelika Reiser,...
FUZZIEEE
2007
IEEE
15 years 10 months ago
Using Orders of Magnitude and Nominal Variables to Construct Fuzzy Partitions
— The application of Qualitative Reasoning to Learning Algorithms can provide these models with the capability of automate common-sense and expert reasoning. Learning algorithms ...
Cati Olmo, Germán Sánchez, Francesc ...
ICC
2007
IEEE
269views Communications» more  ICC 2007»
15 years 10 months ago
A Routing-Driven Key Management Scheme for Heterogeneous Sensor Networks
–The many-to-one traffic pattern dominates in sensor networks, where a large number of sensor nodes send data to one sink. A sensor node may only communicate with a small portion...
Xiaojiang Du, Yang Xiao, Song Ci, Mohsen Guizani, ...