Sciweavers

96 search results - page 12 / 20
» isci 2008
Sort
View
ISCI
2007
135views more  ISCI 2007»
14 years 10 months ago
Generalising the array split obfuscation
An obfuscation is a behaviour-preserving program transformation whose aim is to make a program “harder to understand”. Obfuscations are mainly applied to make reverse engineer...
Stephen Drape
ISCI
2007
138views more  ISCI 2007»
14 years 10 months ago
A fast algorithm for one-unit ICA-R
Independent component analysis (ICA) aims to recover a set of unknown mutually independent source signals from their observed mixtures without knowledge of the mixing coefficients...
Qiu-Hua Lin, Yong-Rui Zheng, Fuliang Yin, Hualou L...
ISCI
2007
130views more  ISCI 2007»
14 years 10 months ago
Computing with words and its relationships with fuzzistics
ct 9 Words mean different things to different people, and so are uncertain. We, therefore, need a fuzzy set model for a word 10 that has the potential to capture their uncertaint...
Jerry M. Mendel
ISCI
2007
170views more  ISCI 2007»
14 years 10 months ago
Automatic learning of cost functions for graph edit distance
Graph matching and graph edit distance have become important tools in structural pattern recognition. The graph edit distance concept allows us to measure the structural similarit...
Michel Neuhaus, Horst Bunke
ISCI
2007
103views more  ISCI 2007»
14 years 10 months ago
Threshold-based declustering
Declustering techniques reduce query response time through parallel I/O by distributing data among multiple devices. Except for a few cases it is not possible to find declusterin...
Ali Saman Tosun