Sciweavers

5722 search results - page 895 / 1145
» Security Function Interactions
Sort
View
AAAI
2008
15 years 6 months ago
Learning to Analyze Binary Computer Code
We present a novel application of structured classification: identifying function entry points (FEPs, the starting byte of each function) in program binaries. Such identification ...
Nathan E. Rosenblum, Xiaojin Zhu, Barton P. Miller...
124
Voted
FLAIRS
2007
15 years 6 months ago
Contextual Concept Discovery Algorithm
In this paper, we focus on the ontological concept extraction and evaluation process from HTML documents. In order to improve this process, we propose an unsupervised hierarchical...
Lobna Karoui, Marie-Aude Aufaure, Nacéra Be...
WSC
2007
15 years 6 months ago
Visual exploration and evaluation of climate-related simulation data
Large, heterogeneous volumes of simulation data are calculated and stored in many disciplines, e.g. in climate and climate impact research. To gain insight, current climate analys...
Thomas Nocke, Michael Flechsig, Uwe Böhm
CIBCB
2005
IEEE
15 years 6 months ago
A Transcriptional Approach to Gene Clustering
— We present an integrative method for clustering coregulated genes and elucidating their underlying regulatory mechanisms. We use multi-state partition functions and thermodynam...
Ilias Tagkopoulos
DFKI
2005
Springer
15 years 6 months ago
Multiagent Systems Without Agents - Mirror-Holons for the Compilation and Enactment of Communication Structures
It is widely accepted in Distributed Artificial Intelligence that a crucial property of artificial agents is their autonomy. Whereas agent autonomy enables features of agent-base...
Matthias Nickles, Gerhard Weiß