Sciweavers

4352 search results - page 862 / 871
» A Representation Theorem and Applications
Sort
View
VIROLOGY
2010
179views more  VIROLOGY 2010»
13 years 8 months ago
Automatic binary deobfuscation
Abstract. This paper gives an overview of our research in the automation of the process of software protection analysis. We will focus more particularly on the problem of obfuscati...
Yoann Guillot, Alexandre Gazet
ACMDIS
2010
ACM
13 years 8 months ago
Design's processional character
In this paper, we examine the ideas behind and reactions to a prototype online tool designed, in-house, for an art college's interaction design department. The web-based prot...
Laurel Swan, Diana Tanase, Alex S. Taylor
EACL
2010
ACL Anthology
13 years 8 months ago
Generating Referring Expressions in Context: The GREC Task Evaluation Challenges
Until recently, referring expression generation (reg) research focused on the task of selecting the semantic content of definite mentions of listener-familiar discourse entities. I...
Anja Belz, Eric Kow, Jette Viethen, Albert Gatt
CAIP
2009
Springer
202views Image Analysis» more  CAIP 2009»
13 years 8 months ago
Near-Regular Texture Synthesis
This paper describes a method for seamless enlargement or editing of difficult colour textures containing simultaneously both regular periodic and stochastic components. Such textu...
Michal Haindl, Martin Hatka
EDM
2009
184views Data Mining» more  EDM 2009»
13 years 8 months ago
Process Mining Online Assessment Data
Traditional data mining techniques have been extensively applied to find interesting patterns, build descriptive and predictive models from large volumes of data accumulated throug...
Mykola Pechenizkiy, Nikola Trcka, Ekaterina Vasily...