Sciweavers

1607 search results - page 175 / 322
» The existence of k-radius sequences
Sort
View
IRI
2006
IEEE
14 years 3 months ago
A similarity based technique for detecting malicious executable files for computer forensics
With the rapidly increasing complexity of computer systems and the sophistication of hacking tools and techniques, there is a crucial need for computer forensic analysis technique...
Jun-Hyung Park, Minsoo Kim, BongNam Noh, James B. ...
ISLPED
2006
ACM
99views Hardware» more  ISLPED 2006»
14 years 3 months ago
Thermal via allocation for 3D ICs considering temporally and spatially variant thermal power
All existing methods for thermal-via allocation are based on a steady-state thermal analysis and may lead to excessive number of thermal vias. This paper develops an accurate and ...
Hao Yu, Yiyu Shi, Lei He, Tanay Karnik
CVPR
2010
IEEE
14 years 2 months ago
Learning 3D Action Models from a few 2D videos for View Invariant Action Recognition
Most existing approaches for learning action models work by extracting suitable low-level features and then training appropriate classifiers. Such approaches require large amount...
Pradeep Natarajan, Vivek Singh, Ram Nevatia
ICEBE
2005
IEEE
168views Business» more  ICEBE 2005»
14 years 2 months ago
Frequency Operators for Condensative Queries over Data Streams
Over a traditional Database Management System (DBMS), the answer to an aggregate query is usually much smaller than the answer to a similar nonaggregate query. Therefore, we call ...
Lisha Ma, Werner Nutt
ICRA
2005
IEEE
150views Robotics» more  ICRA 2005»
14 years 2 months ago
An Integrated Spatial Path-planning and Controller Design Approach for a Hover-mode Helicopter Model
— The objective of this paper is to design a controller based on a nonlinear hover-mode model for a helicopter, which can be seamlessly integrated in an existing spatial path-pla...
Kaustubh Pathak, Sunil Kumar Agrawal