The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Detecting bugs with code mining has proven to be an effective approach. However, the existing methods suffer from reporting serious false positives and false negatives. In this paper, we developed an approach called AntMiner to improve the precision of code mining by carefully preprocessing the source code. Specifically, we employ the program slicing technique to decompose the original source repository...
Motion segmentation for dynamic scene is fundamental in computer vision. The key issue is to estimate number and parameters of transformations simultaneously. However, transformations cannot be measured by general Euclidean distance because of them not lying in vector space. In this paper, we convert transformations into fitness vectors which can be easily measured by cosine similarity. Then we apply...
Although Kernel Principle Component Analysis(KPCA)has been used to monitoring nonlinear processes, it is not well suited for fault diagnosis. In order to solve this problem, a new method of fault detection and diagnosis for nonlinear processes based on KPCA and Least Squares Support Vector Machine(LSSVM) is proposed. The KPCA is used to monitor faults and extract feature and LSSVM model is used to...
The malicious code has characteristic of various types, and its ability of hiding increases quickly. In this paper, according to the analysis of hiding technology of malicious programs, it proposed a new idea of detecting malware based on the raw data. Finally, the results are given, which are compared with the current security detection scanners. It is a beneficial attempt of this method in detecting...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.