Sciweavers

6598 search results - page 1243 / 1320
» Graph Theory with Applications
Sort
View
VIROLOGY
2010
179views more  VIROLOGY 2010»
15 years 2 months ago
Automatic binary deobfuscation
Abstract. This paper gives an overview of our research in the automation of the process of software protection analysis. We will focus more particularly on the problem of obfuscati...
Yoann Guillot, Alexandre Gazet
CORR
2010
Springer
168views Education» more  CORR 2010»
15 years 2 months ago
Gaussian Process Structural Equation Models with Latent Variables
In a variety of disciplines such as social sciences, psychology, medicine and economics, the recorded data are considered to be noisy measurements of latent variables connected by...
Ricardo Silva
ACL
2010
15 years 2 months ago
Wikipedia as Sense Inventory to Improve Diversity in Web Search Results
Is it possible to use sense inventories to improve Web search results diversity for one word queries? To answer this question, we focus on two broad-coverage lexical resources of ...
Celina Santamaría, Julio Gonzalo, Javier Ar...
ICCV
2009
IEEE
15 years 2 months ago
Estimating human shape and pose from a single image
We describe a solution to the challenging problem of estimating human body shape from a single photograph or painting. Our approach computes shape and pose parameters of a 3D huma...
Peng Guan, Alexander Weiss, Alexandru O. Balan, Mi...
ECEASST
2010
15 years 1 months ago
Safe Integration of Annotated Components in Open Source Projects
: The decision of using existing software components versus building from scratch custom software is one of the most complex and important choices of the entire development/integra...
Sergio Areias, Daniela Carneiro da Cruz, Pedro Ran...
« Prev « First page 1243 / 1320 Last » Next »