Sciweavers

82 search results - page 14 / 17
» Video copy detection: a comparative study
Sort
View
CCS
2010
ACM
13 years 7 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
GECCO
2008
Springer
206views Optimization» more  GECCO 2008»
13 years 8 months ago
Improving accuracy of immune-inspired malware detectors by using intelligent features
In this paper, we show that a Bio-inspired classifier’s accuracy can be dramatically improved if it operates on intelligent features. We propose a novel set of intelligent feat...
M. Zubair Shafiq, Syed Ali Khayam, Muddassar Faroo...
ISCA
2002
IEEE
128views Hardware» more  ISCA 2002»
14 years 11 days ago
Detailed Design and Evaluation of Redundant Multithreading Alternatives
Exponential growth in the number of on-chip transistors, coupled with reductions in voltage levels, makes each generation of microprocessors increasingly vulnerable to transient f...
Shubhendu S. Mukherjee, Michael Kontz, Steven K. R...
BMCBI
2005
99views more  BMCBI 2005»
13 years 7 months ago
CGH-Profiler: Data mining based on genomic aberration profiles
Background: CGH-Profiler is a program that supports the analysis of genomic aberrations measured by Comparative Genomic Hybridisation (CGH). Comparative genomic hybridisation (CGH...
Falk Schubert, Bernhard Tausch, Stefan Joos, Rolan...
TCSV
2008
313views more  TCSV 2008»
13 years 7 months ago
Fast Pedestrian Detection Using a Cascade of Boosted Covariance Features
Efficiently and accurately detecting pedestrians plays a very important role in many computer vision applications such as video surveillance and smart cars. In order to find the ri...
Sakrapee Paisitkriangkrai, Chunhua Shen, Jian Zhan...