Sciweavers

326 search results - page 60 / 66
» Automatic binary deobfuscation
Sort
View
FCCM
2008
IEEE
212views VLSI» more  FCCM 2008»
14 years 2 months ago
Map-reduce as a Programming Model for Custom Computing Machines
The map-reduce model requires users to express their problem in terms of a map function that processes single records in a stream, and a reduce function that merges all mapped out...
Jackson H. C. Yeung, C. C. Tsang, Kuen Hung Tsoi, ...
ICASSP
2008
IEEE
14 years 2 months ago
Filter bank design based on minimization of individual aliasing terms for minimum mutual information subband adaptive beamformin
This paper presents new filter bank design methods for subband adaptive beamforming. In this work, we design analysis and synthesis prototypes for modulated filter banks so as t...
Ken'ichi Kumatani, John W. McDonough, S. Schachl, ...
ICDM
2008
IEEE
97views Data Mining» more  ICDM 2008»
14 years 2 months ago
Semi-supervised Learning from General Unlabeled Data
We consider the problem of Semi-supervised Learning (SSL) from general unlabeled data, which may contain irrelevant samples. Within the binary setting, our model manages to better...
Kaizhu Huang, Zenglin Xu, Irwin King, Michael R. L...
IEEEARES
2007
IEEE
14 years 1 months ago
Static evaluation of Certificate Policies for GRID PKIs interoperability
Validating an end-entity X.509 digital certificate prior to authorizing it for using a resource into the computational Grid has become a widely studied topic due to its importance...
Valentina Casola, Nicola Mazzocca, Jesus Luna, Osc...
NDSS
2007
IEEE
14 years 1 months ago
Generic Application-Level Protocol Analyzer and its Language
Application-level protocol analyzers are important components in tools such as intrusion detection systems, firewalls, and network monitors. Currently, protocol analyzers are wri...
Nikita Borisov, David Brumley, Helen J. Wang, John...