Sciweavers

2042 search results - page 292 / 409
» Automatic Understanding of Signals
Sort
View
WCRE
2005
IEEE
15 years 8 months ago
Deobfuscation: Reverse Engineering Obfuscated Code
In recent years, code obfuscation has attracted attention as a low cost approach to improving software security by making it difficult for attackers to understand the inner worki...
Sharath K. Udupa, Saumya K. Debray, Matias Madou
94
Voted
IUI
2005
ACM
15 years 8 months ago
Automated email activity management: an unsupervised learning approach
Many structured activities are managed by email. For instance, a consumer purchasing an item from an e-commerce vendor may receive a message confirming the order, a warning of a ...
Nicholas Kushmerick, Tessa A. Lau
MM
2005
ACM
98views Multimedia» more  MM 2005»
15 years 8 months ago
Personal media sharing and authoring on the web
In this paper, we propose a novel system working on the Web for personal media sharing and authoring. Three primary technologies enable this end-to-end system, including scalable ...
Xian-Sheng Hua, Shipeng Li
ATAL
2005
Springer
15 years 8 months ago
Formalising trust for online communities
Provision of services within a virtual framework for resource sharing across institutional boundaries has become an active research area. Many such services encode access to compu...
Ali Shaikh Ali, Omer F. Rana
CBSE
2005
Springer
15 years 8 months ago
Architecture Based Deployment of Large-Scale Component Based Systems: The Tool and Principles
After a component based system is developed, it has to be deployed into a target environment. As the system becomes much larger and more complex and the environment becomes open an...
Ling Lan, Gang Huang, Liya Ma, Meng Wang, Hong Mei...