Sciweavers

837 search results - page 143 / 168
» Dynamic Burrows-Wheeler Transform
Sort
View
188
Voted
WCRE
2010
IEEE
15 years 29 days ago
Reverse Engineering Self-Modifying Code: Unpacker Extraction
—An important application of binary-level reverse engineering is in reconstructing the internal logic of computer malware. Most malware code is distributed in encrypted (or “pa...
Saumya K. Debray, Jay Patel
160
Voted
ANTSW
2010
Springer
15 years 19 days ago
Functional Blueprints: An Approach to Modularity in Grown Systems
Abstract. The engineering of grown systems poses fundamentally different system integration challenges than ordinary engineering of static designs. On the one hand, a grown system ...
Jacob Beal
140
Voted
ECAI
2010
Springer
15 years 19 days ago
From bursty patterns to bursty facts: The effectiveness of temporal text mining for news
Many document collections are by nature dynamic, evolving as the topics or events they describe change. The goal of temporal text mining is to discover bursty patterns and to ident...
Ilija Subasic, Bettina Berendt
CDC
2010
IEEE
166views Control Systems» more  CDC 2010»
14 years 9 months ago
A numerical method for the optimal control of switched systems
Switched dynamical systems have shown great utility in modeling a variety of systems. Unfortunately, the determination of a numerical solution for the optimal control of such syste...
Humberto González, Ramanarayan Vasudevan, M...
135
Voted
COLING
2010
14 years 9 months ago
DL Meet FL: A Bidirectional Mapping between Ontologies and Linguistic Knowledge
We present a transformation scheme that mediates between description logics (DL) or RDF-encoded ontologies and type hierarchies in feature logics (FL). The DL-to-FL direction is i...
Hans-Ulrich Krieger, Ulrich Schäfer