Sciweavers

326 search results - page 56 / 66
» Automatic binary deobfuscation
Sort
View
IJFCS
2002
58views more  IJFCS 2002»
13 years 7 months ago
Vector Algorithms for Approximate String Matching
Vector algorithms allow the computation of an output vector r = r1r2 :::rm given an input vector e = e1e2 :::em in a bounded number of operations, independent of m the length of t...
Anne Bergeron, Sylvie Hamel
JSC
2002
84views more  JSC 2002»
13 years 7 months ago
A Constructive Algebraic Hierarchy in Coq
We describe a framework of algebraic structures in the proof assistant Coq. We have developed this framework as part of the FTA project in Nijmegen, in which a constructive proof ...
Herman Geuvers, Randy Pollack, Freek Wiedijk, Jan ...
JEI
2008
116views more  JEI 2008»
13 years 6 months ago
Region-of-interest processing for electronic visual prostheses
Electronic visual prostheses, or "bionic eyes," are likely to provide some coarse visual sensations to blind patients who have these systems implanted. The quality of art...
Justin R. Boyle, Anthony J. Maeder, Wageeh W. Bole...
TMI
2010
201views more  TMI 2010»
13 years 6 months ago
Automated and Interactive Lesion Detection and Segmentation in Uterine Cervix Images
—This paper presents a procedure for automatic extraction and segmentation of a class-specific object (or region) by learning class-specific boundaries. We describe and evaluat...
Amir Alush, Hayit Greenspan, Jacob Goldberger
MP
2010
163views more  MP 2010»
13 years 2 months ago
Speeding up IP-based algorithms for constrained quadratic 0-1 optimization
In many practical applications, the task is to optimize a non-linear objective function over the vertices of a well-studied polytope as, e.g., the matching polytope or the travelli...
Christoph Buchheim, Frauke Liers, Marcus Oswald