Sciweavers

347 search results - page 48 / 70
» Computable Versions of Basic Theorems in Functional Analysis
Sort
View
SIGSOFT
2004
ACM
16 years 14 days ago
Testing static analysis tools using exploitable buffer overflows from open source code
Five modern static analysis tools (ARCHER, BOON, PolySpace C Verifier, Splint, and UNO) were evaluated using source code examples containing 14 exploitable buffer overflow vulnera...
Misha Zitser, Richard Lippmann, Tim Leek
NECO
1998
151views more  NECO 1998»
14 years 11 months ago
Nonlinear Component Analysis as a Kernel Eigenvalue Problem
We describe a new method for performing a nonlinear form of Principal Component Analysis. By the use of integral operator kernel functions, we can e ciently compute principal comp...
Bernhard Schölkopf, Alex J. Smola, Klaus-Robe...
JCC
2007
162views more  JCC 2007»
14 years 11 months ago
Bond electron pair: Its relevance and analysis from the quantum chemistry point of view
: This paper first comments on the surprisingly poor status that Quantum Chemistry has offered to the fantastic intuition of Lewis concerning the distribution of the electrons in ...
Jean-Paul Malrieu, Nathalie Guihéry, Carmen...
FUIN
2011
358views Cryptology» more  FUIN 2011»
14 years 3 months ago
Unsupervised and Supervised Learning Approaches Together for Microarray Analysis
In this article, a novel concept is introduced by using both unsupervised and supervised learning. For unsupervised learning, the problem of fuzzy clustering in microarray data as ...
Indrajit Saha, Ujjwal Maulik, Sanghamitra Bandyopa...
IJDE
2006
95views more  IJDE 2006»
14 years 11 months ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum