Sciweavers

218 search results - page 13 / 44
» Using BIST Control for Pattern Generation
Sort
View
DIMVA
2006
15 years 1 months ago
Detecting Self-mutating Malware Using Control-Flow Graph Matching
Next generation malware will by be characterized by the intense use of polymorphic and metamorphic techniques aimed at circumventing the current malware detectors, based on pattern...
Danilo Bruschi, Lorenzo Martignoni, Mattia Monga
177
Voted
PRL
2011
14 years 3 months ago
A Bayes-true data generator for evaluation of supervised and unsupervised learning methods
Benchmarking pattern recognition, machine learning and data mining methods commonly relies on real-world data sets. However, there are some disadvantages in using real-world data....
Janick V. Frasch, Aleksander Lodwich, Faisal Shafa...
102
Voted
LOPSTR
1994
Springer
15 years 4 months ago
Using Call/Exit Analysis for Logic Program Transformation
A technique for transformation of definite logic programs is presented. A first phase performs an analysis of the extended call/exit patterns of the source program. It is shown tha...
Dmitri Boulanger, Maurice Bruynooghe
ICRA
2002
IEEE
161views Robotics» more  ICRA 2002»
15 years 5 months ago
A Method for Co-Evolving Morphology and Walking Pattern of Biped Humanoid Robot
— In this paper, we present a method for co-evolving structures and controller of biped walking robots. Currently, biped walking humanoid robots are designed manually on trial-an...
Ken Endo, Fuminori Yamasaki, Takashi Maeno, Hiroak...
85
Voted
GLOBECOM
2006
IEEE
15 years 6 months ago
Cyclic Codes Tailored to a Known Set of Error Patterns
— We propose a high-rate error-pattern control code based on a generator polynomial targeting a specific set of known dominant error patterns. This code is based on first const...
Jihoon Park, Jaekyun Moon