Sciweavers

1143 search results - page 49 / 229
» Extraction in software watermarking
Sort
View
VMCAI
2005
Springer
14 years 1 months ago
Minimizing Counterexample with Unit Core Extraction and Incremental SAT
Abstract. It is a hotly researching topic to eliminate irrelevant variables from counterexample, to make it easier to be understood. K Ravi proposes a two-stages counterexample min...
ShengYu Shen, Ying Qin, Sikun Li
WCRE
2010
IEEE
13 years 6 months ago
Reverse Engineering Self-Modifying Code: Unpacker Extraction
—An important application of binary-level reverse engineering is in reconstructing the internal logic of computer malware. Most malware code is distributed in encrypted (or “pa...
Saumya K. Debray, Jay Patel
WWW
2003
ACM
14 years 8 months ago
Social Network Extraction of Conference Participants
In a ubiquitous computing environment, it is desirable to provide a user with information depending on a user's situation, such as time, location, user behavior, and social c...
Hironori Tomobe, Kôiti Hasida, Mitsuru Ishiz...
ER
2008
Springer
136views Database» more  ER 2008»
13 years 9 months ago
Automating the Extraction of Rights and Obligations for Regulatory Compliance
Abstract. Government regulations are increasingly affecting the security, privacy and governance of information systems in the United States, Europe and elsewhere. Consequently, co...
Nadzeya Kiyavitskaya, Nicola Zeni, Travis D. Breau...
MICCAI
1998
Springer
13 years 12 months ago
Vascular Shape Segmentation and Structure Extraction Using a Shape-Based Region-Growing Model
A new, practical, and efficient approach is proposed for 3D vascular segmentation and bifurcation structure extraction. The method uses a combination of mathematical morphology, re...
Yoshitaka Masutani, Thomas Schiemann, Karl Heinz H...