Sciweavers

9006 search results - page 1536 / 1802
» Modeling Software
Sort
View
AAAI
2008
15 years 6 months ago
Learning to Analyze Binary Computer Code
We present a novel application of structured classification: identifying function entry points (FEPs, the starting byte of each function) in program binaries. Such identification ...
Nathan E. Rosenblum, Xiaojin Zhu, Barton P. Miller...
DAC
2005
ACM
15 years 6 months ago
Timing-driven placement by grid-warping
Grid-warping is a recent placement strategy based on a novel physical analogy: rather than move the gates to optimize their location, it elastically deforms a model of the 2-D chi...
Zhong Xiu, Rob A. Rutenbar
NLDB
2010
Springer
15 years 6 months ago
Semantic Enriching of Natural Language Texts with Automatic Thematic Role Annotation
Abstract. This paper proposes an approach which utilizes natural language processing (NLP) and ontology knowledge to automatically denote the implicit semantics of textual requirem...
Sven J. Körner, Mathias Landhäußer
CCS
2008
ACM
15 years 6 months ago
Mutual authentication in RFID: security and privacy
In RFID protocols, tags identify and authenticate themselves to readers. At Asiacrypt 2007, Vaudenay studied security and privacy models for these protocols. We extend this model ...
Radu-Ioan Paise, Serge Vaudenay
LREC
2010
163views Education» more  LREC 2010»
15 years 5 months ago
LIPS: A Tool for Predicting the Lexical Isolation Point of a Word
We present LIPS (Lexical Isolation Point Software), a tool for accurate lexical isolation point (IP) prediction in recordings of speech. The IP is the point in time in which a wor...
Andrew Thwaites, Jeroen Geertzen, William D. Marsl...
« Prev « First page 1536 / 1802 Last » Next »