Sciweavers

365 search results - page 23 / 73
» Extracting Business Rules from Source Code
Sort
View
AEI
2007
91views more  AEI 2007»
14 years 12 months ago
MICF: An effective sanitization algorithm for hiding sensitive patterns on data mining
Data mining mechanisms have widely been applied in various businesses and manufacturing companies across many industry sectors. Sharing data or sharing mined rules has become a tr...
Yu-Chiang Li, Jieh-Shan Yeh, Chin-Chen Chang
SP
2000
IEEE
105views Security Privacy» more  SP 2000»
15 years 4 months ago
Open Source in Security: Visiting the Bizarre
Although open-source software development has virtues, there is reason to believe that the approach would not have a significant effect on the security of today’s systems. The ...
Fred B. Schneider
ICIAP
2005
ACM
15 years 12 months ago
Qualitative Real-Time Range Extraction for Preplanned Scene Partitioning Using Laser Beam Coding
This paper proposes a novel technique to extract range using a phase-only filter for a laser beam. The workspace is partitioned according to M meaningful preplanned range segments...
Didi Sazbon, Zeev Zalevsky, Ehud Rivlin
WCRE
2006
IEEE
15 years 5 months ago
Extracting Output Formats from Executables
We describe the design and implementation of FFE/x86 (File-Format Extractor for x86), an analysis tool that works on stripped executables (i.e., neither source code nor debugging ...
Junghee Lim, Thomas W. Reps, Ben Liblit
IPM
2006
171views more  IPM 2006»
14 years 11 months ago
Automatic extraction of bilingual word pairs using inductive chain learning in various languages
In this paper, we propose a new learning method for extracting bilingual word pairs from parallel corpora in various languages. In cross-language information retrieval, the system...
Hiroshi Echizen-ya, Kenji Araki, Yoshio Momouchi