Sciweavers

1002 search results - page 155 / 201
» Towards Graph Programs for Graph Algorithms
Sort
View
SP
2009
IEEE
262views Security Privacy» more  SP 2009»
15 years 9 months ago
Automatic Reverse Engineering of Malware Emulators
Malware authors have recently begun using emulation technology to obfuscate their code. They convert native malware binaries into bytecode programs written in a randomly generated...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...
DM
2006
128views more  DM 2006»
15 years 2 months ago
Non-trivial t-designs without repeated blocks exist for all t
A computer package is being developed at Bayreuth for the generation and investigation of discrete structures. The package is a C and C++ class library of powerful algorithms endow...
Luc Teirlinck
CVPR
2008
IEEE
16 years 4 months ago
Learning for stereo vision using the structured support vector machine
We present a random field based model for stereo vision with explicit occlusion labeling in a probabilistic framework. The model employs non-parametric cost functions that can be ...
Yunpeng Li, Daniel P. Huttenlocher
ICDE
2004
IEEE
101views Database» more  ICDE 2004»
16 years 3 months ago
Personalization of Queries in Database Systems
As information becomes available in increasing amounts to a wide spectrum of users, the need for a shift towards a more user-centered information access paradigm arises. We develo...
Georgia Koutrika, Yannis E. Ioannidis
EMMCVPR
2009
Springer
15 years 9 months ago
Robust Segmentation by Cutting across a Stack of Gamma Transformed Images
7th International Conference on Energy Minimization Methods in Computer Vision and Pattern Recognition, Bonn, Germany, August 24-27, 2009 Medical image segmentation appears to be ...
Elena Bernardis, Stella X. Yu