Sciweavers

2543 search results - page 408 / 509
» Using PageRank in Feature Selection
Sort
View
KDD
2004
ACM
330views Data Mining» more  KDD 2004»
14 years 9 months ago
Learning to detect malicious executables in the wild
In this paper, we describe the development of a fielded application for detecting malicious executables in the wild. We gathered 1971 benign and 1651 malicious executables and enc...
Jeremy Z. Kolter, Marcus A. Maloof
PERCOM
2003
ACM
14 years 8 months ago
PILGRIM: A Location Broker and Mobility-Aware Recommendation System
Mobile computing adds a mostly unexplored dimension to data mining: user's position is a relevant piece of information, and recommendation systems, selecting and ranking link...
Mauro Brunato, Roberto Battiti
CHI
2010
ACM
14 years 3 months ago
Cord input: an intuitive, high-accuracy, multi-degree-of-freedom input method for mobile devices
A cord, although simple in form, has many interesting physical affordances that make it powerful as an input device. Not only can a length of cord be grasped in different location...
Julia Schwarz, Chris Harrison, Scott E. Hudson, Je...
TEI
2009
ACM
70views Hardware» more  TEI 2009»
14 years 3 months ago
Peripheral tangible interaction by analytic design
Tangible User Interfaces (TUIs) are commonly accepted as those in which the configuration of physical objects embodies digital system state, providing “graspable” digital medi...
Darren Edge, Alan F. Blackwell
ICDAR
2009
IEEE
14 years 3 months ago
Seal Detection and Recognition: An Approach for Document Indexing
Reliable indexing of documents having seal instances can be achieved by recognizing seal information. This paper presents a novel approach for detecting and classifying such multi...
Partha Pratim Roy, Umapada Pal, Josep Lladó...