Sciweavers

326 search results - page 46 / 66
» Automatic binary deobfuscation
Sort
View
DAC
2003
ACM
14 years 8 months ago
Instruction encoding synthesis for architecture exploration using hierarchical processor models
This paper presents a novel instruction encoding generation technique for use in architecture exploration for application specific processors. The underlying exploration methodolo...
Achim Nohl, Volker Greive, Gunnar Braun, Andreas H...
ICML
2006
IEEE
14 years 8 months ago
Constructing informative priors using transfer learning
Many applications of supervised learning require good generalization from limited labeled data. In the Bayesian setting, we can try to achieve this goal by using an informative pr...
Rajat Raina, Andrew Y. Ng, Daphne Koller
ICPR
2010
IEEE
14 years 2 months ago
Exploiting Visual Quasi-Periodicity for Automated Chewing Event Detection Using Active Appearance Models and Support Vector Mach
We present a method that automatically detects chewing events in surveillance video of a subject. Firstly, an Active Appearance Model (AAM) is used to track a subject’s face acr...
Steven Cadavid, Mohamed Abdel-Mottaleb
ISBI
2009
IEEE
14 years 2 months ago
Lesion Detection and Segmentation in Uterine Cervix Images Using an Arc-Level MRF
This study develops a procedure for automatic extraction and segmentation of a class-specific object (or region) by learning class-specific boundaries. We present and evaluate t...
Amir Alush, Hayit Greenspan, Jacob Goldberger
CPAIOR
2009
Springer
14 years 2 months ago
Learning How to Propagate Using Random Probing
Abstract. In constraint programming there are often many choices regarding the propagation method to be used on the constraints of a problem. However, simple constraint solvers usu...
Efstathios Stamatatos, Kostas Stergiou