Sciweavers

3392 search results - page 538 / 679
» Using Knowledge Representation to Understand Interactive Sys...
Sort
View
IWPC
2009
IEEE
15 years 10 months ago
The effectiveness of source code obfuscation: An experimental assessment
Source code obfuscation is a protection mechanism widely used to limit the possibility of malicious reverse engineering or attack activities on a software system. Although several...
Mariano Ceccato, Massimiliano Di Penta, Jasvir Nag...
IPPS
2007
IEEE
15 years 10 months ago
Power-Aware Speedup
Power-aware processors operate in various power modes to reduce energy consumption with a corresponding decrease in peak processor throughput. Recent work has shown power-aware cl...
Rong Ge, Kirk W. Cameron
ICASSP
2010
IEEE
15 years 4 months ago
Comparing the contributions of context and prosody in text-independent dialog act recognition
Automatic segmentation and classification of dialog acts (DAs; e.g., statements versus questions) is important for spoken language understanding (SLU). While most systems have re...
Kornel Laskowski, Elizabeth Shriberg
IJPRAI
2000
135views more  IJPRAI 2000»
15 years 3 months ago
Towards Unrestricted Lip Reading
Lip reading provides useful information in speech perception and language understanding, especially when the auditory speech is degraded. However, many current automatic lip readi...
Uwe Meier, Rainer Stiefelhagen, Jie Yang, Alex Wai...
HICSS
2010
IEEE
185views Biometrics» more  HICSS 2010»
15 years 11 months ago
Concurrent Architecture for Automated Malware Classification
This paper introduces a new architecture for automating the generalization of program structure and the recognition of common patterns in the area of malware analysis. By using ma...
Timothy Daly, Luanne Burns