Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for 'Detecting'
Detecting published presentations and documents on DocSlides.
Detecting Variation UNIT 03
by phoebe-click
Detecting Variation. In populations or when compa...
Detecting Creativity in Open-Ended Learning Environments
by syfarect
Roi Shillo, Nick Hoernle, Kobi Gal. Creativity isâ...
Trend Micro Incorporated Research Paper Detecting APT Activity with Network Trafc Analysis Nart Villeneuve and James Bennett PAGE II DETECT NG APT ACT TY W TH NETWORK TRAFF C ANALYS ONTENTS About
by liane-varnes
Introduction Detecting Remote Access Trojans Gh...
The Parrot Is dead.
by tawny-fly
Observing Unobservable Network Communications. Am...
Short Dispersed Repeats
by pasty-toler
Kaleigh. , . mariam. , Michael and Nicholas . Sta...
Detecting Format String Vulnerabilities with Type QualifiersShankar, T
by tawny-fly
1 ContributionsType System for detecting
Detecting Certainness in Spoken Tutorial Dialogues
by pasty-toler
Liscombe, Hirschberg & . Venditti. Using Syst...
Inferring Road Networks
by dardtang
from. . GPS . Trajectories. Radu . Mariescu. . I...
Inferring Road Networks
by dollysprite
from. . GPS . Trajectories. Radu . Mariescu. . I...
Detecting Radiation and Radiation Around You
by susan2
What is radiation?. Radiation is the giving off of...
Detecting Adversarial Examples Is (Nearly) As Hard As Classifying Them
by ariel
Florian Tramèr. Stanford University, Google, ETHZ...
Detecting and Correcting Bit Errors
by skylar
COS . 463. : Wireless . Networks. Lecture . 8. Kyl...
Low Noise Front-End for HEP Experiments:
by danya
from the Brookhaven Years to the Road Ahead. In Me...
Adding Algorithm Based Fault-Tolerance to BLIS
by natalie
Tyler Smith, Robert van de Geijn, Mikhail Smelyans...
Detecting AI Writing: Your Ultimate Guide
by StevenPaul
Detecting AI Writing: Your Ultimate Guide
Detecting Traffic Congestion s Using Cell Phone Accelerometers
by natalia-silvester
2 04 06 08 12 14 Fluent Congestion Fluent Moderate...
The Role of Web Hosting Providers in Detecting Compromised Websites Davide Canal
by marina-yarberry
fr Davide Balzarotti EURECOM France balzarottieure...
Detecting People Using Mutually Consistent Poselet Activations Lubomir Bourdev
by phoebe-click
San Jose CA lbourdevsmajibroxmalik eecsberkeleyed...
Agriculture Ecosystems and Environment Contents lists available at ScienceDir
by sherrill-nordquist
elseviercomlocateagee Detecting pest control servi...
Updated s AgAb Combo Information Sheet for Testing Programs s AgAb Combo Determine Combo is a rapid test capable of detecting HIV p antigen and HIV and HIV antibodies
by tatiana-dople
The p24 antigen is a part of the HIV virus and ca...
DETECTING INDIAN CLASSICAL VOCAL STYLES FROM MELODIC CONTOURS Amruta Vidwans Kaustuv Kanti Ganguli Preeti Rao Department of Electrical Engineering Indian Institute of Technology Bombay nd CompMusic W
by lois-ondreau
Todi 40 32 80 Subhapanthuvarali 40 36 90 2 Malka...
Detecting Cheaters for Multiplayer Games Theory Design
by tatyana-admore
F Yeung John CS Lui Department of Computer Science...
A Study of Detecting Computer Viruses in RealInfected Files in the gram Representation with Machine Learning Methods Note this is an extended version
by faustina-dinatale
The LNCS published versio n is available via spri...
Model for Detecting the Existence of Unkno wn Computer Viruses in RealTime Je rey M
by danika-pritchard
oas Reliable Soft are ec hnologies en thouse Suit...
Detecting Mobile Phone Accessories Peter Chadbourne Senior Applications Manager USB Signal Path Applications Group Fairchild Semiconductor South Portland ME INTRODUCTION The number of mobile phones s
by debby-jeon
Smartphones have more features and applications t...
Detecting and Measuring Similarity in Code Clones Randy Smith and Susan Horwitz Department of Computer Sciences University of Wisconsin Madison smithrhorwitz cs
by trish-goza
wiscedu Abstract Most previous work on codeclone d...
Detecting Scene Elements Using Maximally Stable Colour Regions Stanislav Basovnik Lukas Mach Andrej Mikulik and David Obdrzalek Charles University in Prague Faculty of Mathematics and Physics Malostr
by alida-meadow
com lukasmachgmailcom andrejmikulikgmailcom davido...
Markov Networks for Detecting Overlapping Elements in Sequence Data Joseph Bockhorst Dept
by test
of Computer Sciences University of Wisconsin Madi...
Rev G APRIL Dell Reliable Memory Technology Detecting and isolating memory errors THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES
by liane-varnes
10 G12000462 APRIL 2012 Dell Reliable Memory Tech...
Statically Detecting Likely Buffer Overflow Vulnerabilities David Larochelle larochellecs
by ellena-manuel
virginiaedu University of Virginia Department of C...
Detecting Spoofed Packets Steven J
by alida-meadow
Templeton Karl E Levitt Department of Computer Sc...
Road Sign Detection and Recognition Abstract Introduction Submitted to the IEEE Computer Society International Conference on Computer Vision and Pattern Recognition June
by luanne-stotts
brPage 2br Detecting the Signs a b Figure 1 a sho...
ro duct on In ecen ea bunda sequence da ta ha ed to widespr in ter st in metho detecting eno ic den ifying esp ecia lly no nco ing sequences tha the cr ll br es lo i
by jane-oiler
e tha ea ca ndida te sequence is under electio ll ...
Main sequence An index for detecting mental workload variation in complex tasks Leandro Luigi Di Stasi Adoracin Antol Jos Juan Caas Cognitive Ergonomics Group Department of Experimental Psychology
by cheryl-pisano
Taking the Wickens multiple resource model as the...
Knowledge Acquisifion Detecting and correcting errors in rulebased expert systems an integration of empirical and explanation based learning MICHAEL J
by conchita-marotz
PAZZANI AND CLIFFORD A BRUNK Department of Inform...
Detecting High LogDensities an Approximation for Densest Subgraph Aditya Bhaskara Moses Charikar Eden Chlamtac Uriel Feige Aravindan Vijayaraghavan Abstract In the Densest Subgraph problem given a
by phoebe-click
There is a signi64257cant gap between the best kn...
In Proceedings of the th International Conference on Comp uter Vision ICCV IEEE Video Parsing forAbnormality Detection Borislav Anticand Bjorn Ommer InterdisciplinaryCenterforScienticComputingUniver
by celsa-spraggs
anticbommer iwruniheidelbergde Abstract Detecting ...
Towards Detecting Anomalous User Behavior in Online Social Networks Bimal Viswanath MPISWS M
by pamella-moone
Ahmad Bashir MPISWS Mark Crovella Boston Universi...
ASTUTE Detecting a Different Class of Trafc Anomalies Fernando Silveira Christophe Diot Nina Taft Ramesh Govindan Technicolor UPMC Paris Universitas Intel Labs Berkeley University of Southern Califor
by debby-jeon
This equilibrium property holds if the ows are ne...
Detecting Software Theft via System Call Based Birthmarks Xinran Wang YoonChan Jhi Sencun Zhu Department of Computer Science and Engineering Pennsylvania State University University Park PA Email xi
by tawny-fly
psuedu Peng Liu College of Information Sciences an...
Load More...