Sciweavers

326 search results - page 57 / 66
» Automatic binary deobfuscation
Sort
View
ICASSP
2011
IEEE
12 years 11 months ago
Graphical models for localization of the seizure focus from interictal intracranial EEG
Decision algorithms are developed that use periods of intracranial non-seizure (interictal) EEG to localize epileptogenic networks. Depth and surface recordings are considered fro...
Justin Dauwels, Emad N. Eskandar, Andy Cole, Dan H...
CVPR
2006
IEEE
14 years 9 months ago
Bilayer Segmentation of Live Video
This paper presents an algorithm capable of real-time separation of foreground from background in monocular video sequences. Automatic segmentation of layers from colour/contrast ...
Antonio Criminisi, Geoffrey Cross, Andrew Blake, V...
ACSAC
2007
IEEE
14 years 2 months ago
Automated Security Debugging Using Program Structural Constraints
Understanding security bugs in a vulnerable program is a non-trivial task, even if the target program is known to be vulnerable. Though there exist debugging tools that facilitate...
Chongkyung Kil, Emre Can Sezer, Peng Ning, Xiaolan...
MLMI
2007
Springer
14 years 1 months ago
To Separate Speech
The PASCAL Speech Separation Challenge (SSC) is based on a corpus of sentences from the Wall Street Journal task read by two speakers simultaneously and captured with two circular ...
John W. McDonough, Ken'ichi Kumatani, Tobias Gehri...
RAID
2005
Springer
14 years 1 months ago
Polymorphic Worm Detection Using Structural Information of Executables
Abstract. Network worms are malicious programs that spread automatically across networks by exploiting vulnerabilities that affect a large number of hosts. Because of the speed at...
Christopher Krügel, Engin Kirda, Darren Mutz,...