Sciweavers

4327 search results - page 705 / 866
» Web presentation system using RST events
Sort
View
NECO
2007
115views more  NECO 2007»
15 years 5 months ago
Training Recurrent Networks by Evolino
In recent years, gradient-based LSTM recurrent neural networks (RNNs) solved many previously RNN-unlearnable tasks. Sometimes, however, gradient information is of little use for t...
Jürgen Schmidhuber, Daan Wierstra, Matteo Gag...
SP
2009
IEEE
262views Security Privacy» more  SP 2009»
16 years 6 days ago
Automatic Reverse Engineering of Malware Emulators
Malware authors have recently begun using emulation technology to obfuscate their code. They convert native malware binaries into bytecode programs written in a randomly generated...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...
TASE
2007
IEEE
15 years 11 months ago
Model Checking Software at Compile Time
Software has been under scrutiny by the verification community from various angles in the recent past. There are two major algorithmic approaches to ensure the correctness of and...
Ansgar Fehnker, Ralf Huuck, Patrick Jayet, Michel ...
3DPVT
2006
IEEE
174views Visualization» more  3DPVT 2006»
15 years 11 months ago
Two Stage View Planning for Large-Scale Site Modeling
We present a systematic view planning method to assist construction of 3-D models of large outdoor sites using a mobile robot platform with mounted scanner. In the first stage, w...
Paul Blaer, Peter K. Allen
ACSAC
2003
IEEE
15 years 10 months ago
Automated Analysis for Digital Forensic Science: Semantic Integrity Checking
When computer security violations are detected, computer forensic analysts attempting to determine the relevant causes and effects are forced to perform the tedious tasks of find...
Tye Stallard, Karl N. Levitt