Sciweavers

1154 search results - page 110 / 231
» The Degradation of Knowledge Base Integrity
Sort
View
DIMVA
2011
13 years 19 days ago
Operating System Interface Obfuscation and the Revealing of Hidden Operations
Many software security solutions—including malware analyzers, information flow tracking systems, auditing utilities, and host-based intrusion detectors—rely on knowledge of s...
Abhinav Srivastava, Andrea Lanzi, Jonathon T. Giff...
GLVLSI
2009
IEEE
143views VLSI» more  GLVLSI 2009»
14 years 29 days ago
Unified P4 (power-performance-process-parasitic) fast optimization of a Nano-CMOS VCO
In this paper, we present the design of a P4 (Power-PerformanceProcess-Parasitic) aware voltage controlled oscillator (VCO) at nanoCMOS technologies. Through simulations, we have ...
Dhruva Ghai, Saraju P. Mohanty, Elias Kougianos
DMIN
2008
190views Data Mining» more  DMIN 2008»
13 years 10 months ago
Optimization of Self-Organizing Maps Ensemble in Prediction
The knowledge discovery process encounters the difficulties to analyze large amount of data. Indeed, some theoretical problems related to high dimensional spaces then appear and de...
Elie Prudhomme, Stéphane Lallich
BMCBI
2005
112views more  BMCBI 2005»
13 years 9 months ago
Towards precise classification of cancers based on robust gene functional expression profiles
Background: Development of robust and efficient methods for analyzing and interpreting high dimension gene expression profiles continues to be a focus in computational biology. Th...
Zheng Guo, Tianwen Zhang, Xia Li, Qi Wang, Jianzhe...
IADIS
2004
13 years 10 months ago
Web Document Classification: Managing Context Change
This paper focuses on the information management systems of the dynamic World Wide Web. Many individual web pages, such as news portals, provide periodic information and public an...
Sung Sik Park, Yang Sok Kim, Byeong Ho Kang