Sciweavers

1159 search results - page 150 / 232
» Binary Decision Graphs
Sort
View
STOC
2012
ACM
185views Algorithms» more  STOC 2012»
12 years 20 days ago
Subspace evasive sets
In this work we describe an explicit, simple, construction of large subsets of Fn , where F is a finite field, that have small intersection with every k-dimensional affine subsp...
Zeev Dvir, Shachar Lovett
PEPM
2010
ACM
14 years 7 months ago
Context-sensitive analysis of obfuscated x86 executables
A method for context-sensitive analysis of binaries that may have obfuscated procedure call and return operations is presented. Such binaries may use operators to directly manipul...
Arun Lakhotia, Davidson R. Boccardo, Anshuman Sing...
ICSE
2010
IEEE-ACM
14 years 3 months ago
Adaptive bug isolation
Statistical debugging uses lightweight instrumentation and statistical models to identify program behaviors that are strongly predictive of failure. However, most software is most...
Piramanayagam Arumuga Nainar, Ben Liblit
ICIP
2004
IEEE
14 years 11 months ago
A detection-based multiple object tracking method
In this paper we describe a method for tracking multiple objects whose number is unknown and varies during tracking. Based on preliminary results of object detection in each image...
Mei Han, Amit Sethi, Wei Hua, Yihong Gong
IJCAI
2007
13 years 11 months ago
Improving Author Coreference by Resource-Bounded Information Gathering from the Web
Accurate entity resolution is sometimes impossible simply due to insufficient information. For example, in research paper author name resolution, even clever use of venue, title ...
Pallika Kanani, Andrew McCallum, Chris Pal