Sciweavers

326 search results - page 50 / 66
» Automatic binary deobfuscation
Sort
View
AUSAI
2004
Springer
14 years 1 months ago
Set Bounds and (Split) Set Domain Propagation Using ROBDDs
Most propagation-based set constraint solvers approximate the set of possible sets that a variable can take by upper and lower bounds, and perform so-called set bounds propagation....
Peter Hawkins, Vitaly Lagoon, Peter J. Stuckey
DAS
2004
Springer
14 years 1 months ago
A Neural Network Classifier for Junk E-Mail
Abstract. Most e-mail readers spend a non-trivial amount of time regularly deleting junk e-mail (spam) messages, even as an expanding volume of such e-mail occupies server storage ...
Ian Stuart, Sung-Hyuk Cha, Charles C. Tappert
IRI
2003
IEEE
14 years 28 days ago
A Formal Framework for Design Component Contracts
– Building large software systems out of existing software components can save time and cost. These software components range from architectural and design components to binary c...
Jing Dong, Paulo S. C. Alencar, Donald D. Cowan
ICPR
2002
IEEE
14 years 18 days ago
A Robust Approach for Recognition of Text Embedded in Natural Scenes
In this paper, we propose a robust approach for recognition of text embedded in natural scenes. Instead of using binary information as most other OCR systems do, we extract featur...
Jing Zhang, Xilin Chen, Andreas Hanneman, Jie Yang...
GECCO
2010
Springer
150views Optimization» more  GECCO 2010»
14 years 14 days ago
Object-level recombination of commodity applications
This paper presents ObjRecombGA, a genetic algorithm framework for recombining related programs at the object file level. A genetic algorithm guides the selection of object file...
Blair Foster, Anil Somayaji