Sciweavers

1713 search results - page 249 / 343
» Analysis of Procedure Splitability
Sort
View
NDSS
2008
IEEE
14 years 4 months ago
HookFinder: Identifying and Understanding Malware Hooking Behaviors
Installing various hooks into the victim system is an important attacking strategy employed by malware, including spyware, rootkits, stealth backdoors, and others. In order to def...
Heng Yin, Zhenkai Liang, Dawn Song
ICCV
2007
IEEE
14 years 4 months ago
A Multi-Image Restoration Method for Image Reconstruction from Projections
in Proc. IEEE Int’l Conf. on Computer Vision (ICCV), October, 2007 Traditional Bayesian restoration methods depend heavily on the accuracy of underlying generative models. For t...
Yunqiang Chen, Lin Cheng, Tong Fang, Rainer Raupac...
ICDAR
2007
IEEE
14 years 4 months ago
An Efficient Word Segmentation Technique for Historical and Degraded Machine-Printed Documents
Word segmentation is a crucial step for segmentation-free document analysis systems and is used for creating an index based on word matching. In this paper, we propose a novel met...
Michael Makridis, N. Nikolaou, Basilios Gatos
IV
2006
IEEE
111views Visualization» more  IV 2006»
14 years 4 months ago
Mapping Scientific Disciplines and Author Expertise Based on Personal Bibliography Files
This paper presents a novel approach (1) to define, analyze, and map a scientific discipline and (2) to compare and map the expertise of single authors based on personal bibliogra...
Colin Murray, Weimao Ke, Katy Börner
APLAS
2005
ACM
14 years 4 months ago
Calculating Polynomial Runtime Properties
Affine size-change analysis has been used for termination analysis of eager functional programming languages. The same style of analysis is also capable of compactly recording and ...
Hugh Anderson, Siau-Cheng Khoo, Stefan Andrei, Bea...