Sciweavers

837 search results - page 143 / 168
» Dynamic Burrows-Wheeler Transform
Sort
View
WCRE
2010
IEEE
13 years 5 months ago
Reverse Engineering Self-Modifying Code: Unpacker Extraction
—An important application of binary-level reverse engineering is in reconstructing the internal logic of computer malware. Most malware code is distributed in encrypted (or “pa...
Saumya K. Debray, Jay Patel
ANTSW
2010
Springer
13 years 5 months ago
Functional Blueprints: An Approach to Modularity in Grown Systems
Abstract. The engineering of grown systems poses fundamentally different system integration challenges than ordinary engineering of static designs. On the one hand, a grown system ...
Jacob Beal
ECAI
2010
Springer
13 years 5 months ago
From bursty patterns to bursty facts: The effectiveness of temporal text mining for news
Many document collections are by nature dynamic, evolving as the topics or events they describe change. The goal of temporal text mining is to discover bursty patterns and to ident...
Ilija Subasic, Bettina Berendt
CDC
2010
IEEE
166views Control Systems» more  CDC 2010»
13 years 2 months ago
A numerical method for the optimal control of switched systems
Switched dynamical systems have shown great utility in modeling a variety of systems. Unfortunately, the determination of a numerical solution for the optimal control of such syste...
Humberto González, Ramanarayan Vasudevan, M...
COLING
2010
13 years 2 months ago
DL Meet FL: A Bidirectional Mapping between Ontologies and Linguistic Knowledge
We present a transformation scheme that mediates between description logics (DL) or RDF-encoded ontologies and type hierarchies in feature logics (FL). The DL-to-FL direction is i...
Hans-Ulrich Krieger, Ulrich Schäfer