Sciweavers

326 search results - page 35 / 66
» Automatic binary deobfuscation
Sort
View
FIMH
2005
Springer
14 years 1 months ago
Long-Axis Cardiac MRI Contour Detection with Adaptive Virtual Exploring Robot
Abstract. This paper describes a method for automatic contour detection in long-axis cardiac MRI using an adaptive virtual exploring robot. The robot is a simulated trained virtual...
Mark Blok, Mikhail G. Danilouchkine, Cor J. Veenma...
CSFW
2007
IEEE
14 years 2 months ago
Creating Vulnerability Signatures Using Weakest Preconditions
Signature-based tools such as network intrusion detection systems are widely used to protect critical systems. Automatic signature generation techniques are needed to enable these...
David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong...
CVPR
2005
IEEE
14 years 9 months ago
Using Particles to Track Varying Numbers of Interacting People
In this paper, we present a Bayesian framework for the fully automatic tracking of a variable number of interacting targets using a fixed camera. This framework uses a joint multi...
Kevin Smith, Daniel Gatica-Perez, Jean-Marc Odobez
ICPR
2008
IEEE
14 years 9 months ago
Extraction of shoe-print patterns from impression evidence using Conditional Random Fields
Impression evidence in the form of shoe-prints are commonly found in crime scenes. A critical step in automatic shoe-print identification is extraction of the shoe-print pattern. ...
Sargur N. Srihari, Veshnu Ramakrishnan
DAC
2004
ACM
14 years 8 months ago
A new heuristic algorithm for reversible logic synthesis
Reversible logic has applications in many fields, including quantum computing. Synthesis techniques for reversible circuits are not well developed, even for functions with a small...
Pawel Kerntopf