Sciweavers

232 search results - page 37 / 47
» Asynchronous programming, analysis and testing with state ma...
Sort
View
ISW
2007
Springer
15 years 3 months ago
Detecting System Emulators
Malware analysis is the process of determining the behavior and purpose of a given malware sample (such as a virus, worm, or Trojan horse). This process is a necessary step to be a...
Thomas Raffetseder, Christopher Krügel, Engin...
MLMI
2005
Springer
15 years 3 months ago
The 2005 AMI System for the Transcription of Speech in Meetings
Abstract. In this paper we describe the 2005 AMI system for the transcription of speech in meetings used in the 2005 NIST RT evaluations. The system was designed for participation ...
Thomas Hain, Lukas Burget, John Dines, Giulia Gara...
SIGIR
2004
ACM
15 years 3 months ago
Language-specific models in multilingual topic tracking
Topic tracking is complicated when the stories in the stream occur in multiple languages. Typically, researchers have trained only English topic models because the training storie...
Leah S. Larkey, Fangfang Feng, Margaret E. Connell...
SCFBM
2008
151views more  SCFBM 2008»
14 years 9 months ago
Wndchrm - an open source utility for biological image analysis
Background: Biological imaging is an emerging field, covering a wide range of applications in biological and clinical research. However, while machinery for automated experimentin...
Lior Shamir, Nikita Orlov, D. Mark Eckley, Tomasz ...
IEEEARES
2009
IEEE
15 years 4 months ago
Capturing Information Flow with Concatenated Dynamic Taint Analysis
Dynamic taint analysis (DTA) is a technique used for tracking information flow by propagating taint propagation across memory locations during program execution. Most implementat...
Hyung Chan Kim, Angelos D. Keromytis, Michael Covi...