Sciweavers

1285 search results - page 164 / 257
» Topology and Intelligent Data Analysis
Sort
View
DRM
2003
Springer
15 years 9 months ago
Analysis of security vulnerabilities in the movie production and distribution process
Unauthorized copying of movies is a major concern for the motion picture industry. While unauthorized copies of movies have been distributed via portable physical media for some t...
Simon Byers, Lorrie Faith Cranor, David P. Kormann...
SAS
1992
Springer
171views Formal Methods» more  SAS 1992»
15 years 8 months ago
Static Analysis of CLP Programs over Numeric Domains
Abstract Constraint logic programming (CLP) is a generalization of the pure logic programming paradigm, having similar model-theoretic, fixpoint and operational semantics [9]. Sinc...
Roberto Bagnara, Roberto Giacobazzi, Giorgio Levi
GECCO
2009
Springer
138views Optimization» more  GECCO 2009»
15 years 11 months ago
IMAD: in-execution malware analysis and detection
The sophistication of computer malware is becoming a serious threat to the information technology infrastructure, which is the backbone of modern e-commerce systems. We, therefore...
Syed Bilal Mehdi, Ajay Kumar Tanwani, Muddassar Fa...
154
Voted
ICTAI
2006
IEEE
15 years 10 months ago
Learning to Predict Salient Regions from Disjoint and Skewed Training Sets
We present an ensemble learning approach that achieves accurate predictions from arbitrarily partitioned data. The partitions come from the distributed processing requirements of ...
Larry Shoemaker, Robert E. Banfield, Lawrence O. H...
157
Voted
APIN
2008
305views more  APIN 2008»
15 years 4 months ago
A generalized model for financial time series representation and prediction
Abstract Traditional financial analysis systems utilize lowlevel price data as their analytical basis. For example, a decision-making system for stock predictions regards raw price...
Depei Bao