Sciweavers

692 search results - page 101 / 139
» Understanding Finiteness Analysis Using Abstract Interpretat...
Sort
View
SP
2010
IEEE
140views Security Privacy» more  SP 2010»
15 years 3 months ago
Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries
Abstract—Unfortunately, malicious software is still an unsolved problem and a major threat on the Internet. An important component in the fight against malicious software is the...
Clemens Kolbitsch, Thorsten Holz, Christopher Krue...
HICSS
2006
IEEE
121views Biometrics» more  HICSS 2006»
15 years 5 months ago
Enterprise Architecture: A Social Network Perspective
IS Architecture emerges as a result of a sequence of IS project implementations. The architecture that emerges can be viewed as a network of software components linked by their in...
David Dreyfus, Bala Iyer
EUROPAR
2005
Springer
15 years 5 months ago
The Periodic-Linear Model of Program Behavior Capture
Abstract. Understanding and controlling program behavior is a challenging objective for the design of advanced compilers and critical system development. In this paper, we propose ...
Philippe Clauss, Bénédicte Kenmei, J...
ECCV
2010
Springer
15 years 5 months ago
Convolutional learning of spatio-temporal features
Abstract. We address the problem of learning good features for understanding video data. We introduce a model that learns latent representations of image sequences from pairs of su...
AI
2010
Springer
15 years 4 months ago
Overlap versus Imbalance
Abstract. In this paper we give a systematic analysis of the relationship between imbalance and overlap as factors influencing classifier performance. We demonstrate that these t...
Misha Denil, Thomas P. Trappenberg