Sciweavers

778 search results - page 120 / 156
» Vector field contours
Sort
View
KDD
2004
ACM
330views Data Mining» more  KDD 2004»
14 years 8 months ago
Learning to detect malicious executables in the wild
In this paper, we describe the development of a fielded application for detecting malicious executables in the wild. We gathered 1971 benign and 1651 malicious executables and enc...
Jeremy Z. Kolter, Marcus A. Maloof
KDD
2003
ACM
214views Data Mining» more  KDD 2003»
14 years 8 months ago
Adaptive duplicate detection using learnable string similarity measures
The problem of identifying approximately duplicate records in databases is an essential step for data cleaning and data integration processes. Most existing approaches have relied...
Mikhail Bilenko, Raymond J. Mooney
AVBPA
2005
Springer
271views Biometrics» more  AVBPA 2005»
14 years 1 months ago
Dynamic Approach for Face Recognition Using Digital Image Skin Correlation
With the recent emphasis on homeland security, there is an increased interest in accurate and non-invasive techniques for face recognition. Most of the current techniques perform a...
Satprem Pamudurthy, E. Guan, Klaus Mueller, Miriam...
WSCG
2004
158views more  WSCG 2004»
13 years 9 months ago
Fully Automatic Elastic Registration of MR Images with Statistical Feature Extraction
We present a fully automatic scheme for the registration of MR images. The registration is carried out as a combination of an affine and an elastic transformation. The affine part...
Martin Held, Werner Weiser, Franz Wilhelmstöt...
ICASSP
2010
IEEE
13 years 8 months ago
Discriminative template extraction for direct modeling
This paper addresses the problem of developing appropriate features for use in direct modeling approaches to speech recognition, such as those based on Maximum Entropy models or S...
Shankar Shivappa, Patrick Nguyen, Geoffrey Zweig