Sciweavers

2015 search results - page 109 / 403
» Hidden Software Capabilities
Sort
View
DRM
2007
Springer
14 years 3 months ago
Slicing obfuscations: design, correctness, and evaluation
The goal of obfuscation is to transform a program, without affecting its functionality, such that some secret information within the program can be hidden for as long as possible...
Anirban Majumdar, Stephen Drape, Clark D. Thombors...
BMCBI
2008
132views more  BMCBI 2008»
13 years 9 months ago
Clustering ionic flow blockade toggles with a Mixture of HMMs
Background: Ionic current blockade signal processing, for use in nanopore detection, offers a promising new way to analyze single molecule properties with potential implications f...
Alexander G. Churbanov, Stephen Winters-Hilt
ICMI
2003
Springer
166views Biometrics» more  ICMI 2003»
14 years 2 months ago
Georgia tech gesture toolkit: supporting experiments in gesture recognition
Gesture recognition is becoming a more common interaction tool in the fields of ubiquitous and wearable computing. Designing a system to perform gesture recognition, however, can...
Tracy L. Westeyn, Helene Brashear, Amin Atrash, Th...
ICML
2009
IEEE
14 years 10 months ago
Exploiting sparse Markov and covariance structure in multiresolution models
We consider Gaussian multiresolution (MR) models in which coarser, hidden variables serve to capture statistical dependencies among the finest scale variables. Tree-structured MR ...
Myung Jin Choi, Venkat Chandrasekaran, Alan S. Wil...
KDD
2003
ACM
116views Data Mining» more  KDD 2003»
14 years 9 months ago
XRules: an effective structural classifier for XML data
XML documents have recently become ubiquitous because of their varied applicability in a number of applications. Classification is an important problem in the data mining domain, ...
Mohammed Javeed Zaki, Charu C. Aggarwal