Search spammers use questionable search engine optimization techniques to promote their spam links into top search results. Large-scale spammers target commerce queries that they ...
We present a novel application of structured classification: identifying function entry points (FEPs, the starting byte of each function) in program binaries. Such identification ...
Nathan E. Rosenblum, Xiaojin Zhu, Barton P. Miller...
Yeap [42] argued that an important basis for computing a cognitive map is the ability to compute and recognise local environments. Although he has demonstrated how such local envi...
Abstract— The adaptive contrast enhancement (ACE) algorithm, which uses contrast gains (CG’s) to adjust the highfrequency components of images, is a well-known technique for me...
We describe an application of AI search and information visualization techniques to the problem of school redistricting, in which students are assigned to home schools within a co...
Marie desJardins, Blazej Bulka, Ryan Carr, Andrew ...