Sciweavers

7393 search results - page 1302 / 1479
» Synthesis-for-testability using transformations
Sort
View
WCRE
2010
IEEE
15 years 1 months ago
Reverse Engineering Self-Modifying Code: Unpacker Extraction
—An important application of binary-level reverse engineering is in reconstructing the internal logic of computer malware. Most malware code is distributed in encrypted (or “pa...
Saumya K. Debray, Jay Patel
AR
2010
133views more  AR 2010»
15 years 1 months ago
Coordinated Control of Space Robot Teams for the On-Orbit Construction of Large Flexible Space Structures
Teams of autonomous space robots are needed for future space missions such as the construction of large solar power stations and large space telescopes in earth orbit. This work fo...
Peggy Boning, Steven Dubowsky
BMVC
2010
15 years 1 months ago
Three-step image rectification
Image stereo-rectification is the process by which two images of the same solid scene undergo homographic transforms, so that their corresponding epipolar lines coincide and becom...
Pascal Monasse, Jean-Michel Morel, Zhongwei Tang
CIKM
2010
Springer
15 years 1 months ago
Fast dimension reduction for document classification based on imprecise spectrum analysis
This paper proposes an algorithm called Imprecise Spectrum Analysis (ISA) to carry out fast dimension reduction for document classification. ISA is designed based on the one-sided...
Hu Guan, Bin Xiao, Jingyu Zhou, Minyi Guo, Tao Yan...
DEXA
2010
Springer
138views Database» more  DEXA 2010»
15 years 1 months ago
Enrichment of Raw Sensor Data to Enable High-Level Queries
Abstract. Sensor networks are increasingly used across various application domains. Their usage has the advantage of automated, often continuous, monitoring of activities and event...
Kenneth Conroy, Mark Roantree
« Prev « First page 1302 / 1479 Last » Next »