Sciweavers

64 search results - page 3 / 13
» Learning to Analyze Binary Computer Code
Sort
View
NSPW
2003
ACM
15 years 5 months ago
SELF: a transparent security extension for ELF binaries
The ability to analyze and modify binaries is often very useful from a security viewpoint. Security operations one would like to perform on binaries include the ability to extract...
Daniel C. DuVarney, V. N. Venkatakrishnan, Sandeep...
128
Voted
PAMI
2010
170views more  PAMI 2010»
14 years 11 months ago
On the Decoding Process in Ternary Error-Correcting Output Codes
—A common way to model multiclass classification problems is to design a set of binary classifiers and to combine them. Error-Correcting Output Codes (ECOC) represent a successfu...
Sergio Escalera, Oriol Pujol, Petia Radeva
121
Voted
IEEEARES
2010
IEEE
15 years 5 months ago
Detection of Spyware by Mining Executable Files
Spyware represents a serious threat to confidentiality since it may result in loss of control over private data for computer users. This type of software might collect the data and...
Raja Khurram Shahzad, Syed Imran Haider, Niklas La...
132
Voted
ACCV
2010
Springer
14 years 7 months ago
Face Recognition with Decision Tree-Based Local Binary Patterns
Many state-of-the-art face recognition algorithms use image descriptors based on features known as Local Binary Patterns (LBPs). While many variations of LBP exist, so far none of ...
Daniel Maturana, Domingo Mery, Alvaro Soto
BMCBI
2010
156views more  BMCBI 2010»
15 years 16 days ago
PeakAnalyzer: Genome-wide annotation of chromatin binding and modification loci
Background: Functional genomic studies involving high-throughput sequencing and tiling array applications, such as ChIP-seq and ChIP-chip, generate large numbers of experimentally...
Mali Salmon-Divon, Heidi Dvinge, Kairi Tammoja, Pa...