Sciweavers

168 search results - page 31 / 34
» Using Similarity Flooding for Extracting Similar Parts of Pr...
Sort
View
SP
2010
IEEE
194views Security Privacy» more  SP 2010»
13 years 11 months ago
Identifying Dormant Functionality in Malware Programs
—To handle the growing flood of malware, security vendors and analysts rely on tools that automatically identify and analyze malicious code. Current systems for automated malwar...
Paolo Milani Comparetti, Guido Salvaneschi, Engin ...
CVPR
2010
IEEE
13 years 7 months ago
Towards general motion-based face recognition
Motion-based face recognition is a young research topic, inspired mainly by psychological studies on motionbased perception of human faces. Unlike its close relative, appearance-b...
Ning Ye, Terence Sim
CORR
2006
Springer
178views Education» more  CORR 2006»
13 years 7 months ago
A tool set for the quick and efficient exploration of large document collections
: We are presenting a set of multilingual text analysis tools that can help analysts in any field to explore large document collections quickly in order to determine whether the do...
Camelia Ignat, Bruno Pouliquen, Ralf Steinberger, ...
MIR
2005
ACM
141views Multimedia» more  MIR 2005»
14 years 29 days ago
A mutual semantic endorsement approach to image retrieval and context provision
Learning semantics from annotated images to enhance content-based retrieval is an important research direction. In this paper, annotation data are assumed available for only a sub...
Jia Li
RECOMB
2005
Springer
14 years 7 months ago
Learning Interpretable SVMs for Biological Sequence Classification
Background: Support Vector Machines (SVMs) ? using a variety of string kernels ? have been successfully applied to biological sequence classification problems. While SVMs achieve ...
Christin Schäfer, Gunnar Rätsch, Sö...