Sciweavers

2434 search results - page 304 / 487
» Algorithmic Randomness of Closed Sets
Sort
View
SP
2009
IEEE
262views Security Privacy» more  SP 2009»
15 years 10 months ago
Automatic Reverse Engineering of Malware Emulators
Malware authors have recently begun using emulation technology to obfuscate their code. They convert native malware binaries into bytecode programs written in a randomly generated...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...
IROS
2009
IEEE
165views Robotics» more  IROS 2009»
15 years 10 months ago
Autonomous altitude estimation of a UAV using a single onboard camera
Abstract— Autonomous estimation of the altitude of an Unmanned Aerial Vehicle (UAV) is extremely important when dealing with flight maneuvers like landing, steady flight, etc. ...
Anoop Cherian, Jonathan Andersh, Vassilios Morella...
JIFS
2008
155views more  JIFS 2008»
15 years 3 months ago
Improving supervised learning performance by using fuzzy clustering method to select training data
The crucial issue in many classification applications is how to achieve the best possible classifier with a limited number of labeled data for training. Training data selection is ...
Donghai Guan, Weiwei Yuan, Young-Koo Lee, Andrey G...
JCB
1998
105views more  JCB 1998»
15 years 3 months ago
Constructing and Counting Phylogenetic Invariants
Abstract. The method of invariants is an approach to the problem of reconstructing the phylogenetic tree of a collection of m taxa using nucleotide sequence data. Models for the re...
Steven N. Evans, Xiaowen Zhou
PROMISE
2010
14 years 10 months ago
Replication of defect prediction studies: problems, pitfalls and recommendations
Background: The main goal of the PROMISE repository is to enable reproducible, and thus verifiable or refutable research. Over time, plenty of data sets became available, especial...
Thilo Mende