Sciweavers

603 search results - page 29 / 121
» Embedded Formulas Extraction
Sort
View
SP
2010
IEEE
140views Security Privacy» more  SP 2010»
14 years 15 days ago
Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries
Abstract—Unfortunately, malicious software is still an unsolved problem and a major threat on the Internet. An important component in the fight against malicious software is the...
Clemens Kolbitsch, Thorsten Holz, Christopher Krue...
ICASSP
2011
IEEE
13 years 10 days ago
A novel analytical approach to orthogonal bases extraction from AM-FM signals
This paper presents a new method for extracting orthogonal bases from AM-FM signals. Since AM-FM signals are non-stationary, appropriate basis functions are sought provided that i...
Mohammadali Sebghati, Hamidreza Amindavar
ICASSP
2008
IEEE
14 years 3 months ago
A study of using locality preserving projections for feature extraction in speech recognition
This paper presents a new approach to feature analysis in automatic speech recognition (ASR) based on locality preserving projections (LPP). LPP is a manifold based dimensionality...
Yun Tang, Richard Rose
DAC
2001
ACM
14 years 9 months ago
Dynamic Detection and Removal of Inactive Clauses in SAT with Application in Image Computation
In this paper, we present a new technique for the e cient dynamic detection and removal of inactive clauses, i.e. clauses that do not a ect the solutions of interest of a Boolean ...
Aarti Gupta, Anubhav Gupta, Zijiang Yang, Pranav A...
ICTAI
2006
IEEE
14 years 2 months ago
Computing Horn Strong Backdoor Sets Thanks to Local Search
In this paper a new approach for computing Strong Backdoor sets of boolean formula in conjunctive normal form (CNF) is proposed. It makes an original use of local search technique...
Lionel Paris, Richard Ostrowski, Pierre Siegel, La...