Sciweavers

2399 search results - page 417 / 480
» Avatar Information Extraction System
Sort
View
CSIE
2009
IEEE
15 years 10 months ago
Supervised Control of a Flying Performing Robot Using Its Intrinsic Sound
We present the current results of our ongoing research in achieving efficient control of a flying robot for a wide variety of possible applications. A lightweight small indoor h...
Benjamin N. Passow, Sophy Smith, Mario A. Gó...
SP
2009
IEEE
262views Security Privacy» more  SP 2009»
15 years 10 months ago
Automatic Reverse Engineering of Malware Emulators
Malware authors have recently begun using emulation technology to obfuscate their code. They convert native malware binaries into bytecode programs written in a randomly generated...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...
BPM
2009
Springer
258views Business» more  BPM 2009»
15 years 10 months ago
Activity Mining by Global Trace Segmentation
Process Mining is a technology for extracting non-trivial and useful information from execution logs. For example, there are many process mining techniques to automatically discove...
Christian W. Günther, Anne Rozinat, Wil M. P....
COMPSAC
2008
IEEE
15 years 10 months ago
Implicit Social Network Model for Predicting and Tracking the Location of Faults
— In software testing and maintenance activities, the observed faults and bugs are reported in bug report managing systems (BRMS) for further analysis and repair. According to th...
Ing-Xiang Chen, Cheng-Zen Yang, Ting-Kun Lu, Hojun...
HICSS
2008
IEEE
121views Biometrics» more  HICSS 2008»
15 years 10 months ago
The Impact of Directionality in Predications on Text Mining
The number of publications in biomedicine is increasing enormously each year. To help researchers digest the information in these documents, text mining tools are being developed ...
Gondy Leroy, Marcelo Fiszman, Thomas C. Rindflesch