Sciweavers

5314 search results - page 948 / 1063
» Hybrid Dynamic Programming
Sort
View
CCS
2010
ACM
15 years 2 months ago
Input generation via decomposition and re-stitching: finding bugs in Malware
Attackers often take advantage of vulnerabilities in benign software, and the authors of benign software must search their code for bugs in hopes of finding vulnerabilities before...
Juan Caballero, Pongsin Poosankam, Stephen McCaman...
123
Voted
DSD
2010
IEEE
153views Hardware» more  DSD 2010»
15 years 2 months ago
Simulation of High-Performance Memory Allocators
—Current general-purpose memory allocators do not provide sufficient speed or flexibility for modern highperformance applications. To optimize metrics like performance, memory us...
José Luis Risco-Martín, José ...
143
Voted
ICASSP
2010
IEEE
15 years 2 months ago
Shape matching based on graph alignment using hidden Markov models
We present a novel framework based on hidden Markov models (HMMs) for matching feature point sets, which capture the shapes of object contours of interest. Point matching algorith...
Xiaoning Qian, Byung-Jun Yoon
ICPR
2010
IEEE
15 years 2 months ago
A Probabilistic Language Model for Hand Drawings
Probabilistic language models are critical to applications in natural language processing that include speech recognition, optical character recognition, and interfaces for text e...
Abdullah Akce, Timothy Bretl
119
Voted
ADHOC
2007
126views more  ADHOC 2007»
15 years 2 months ago
Energy-aware routing in sensor networks: A large system approach
In many sensor networking environments, the sensor nodes have limited battery capacity and processing power. Hence, it is imperative to develop solutions that are energy-efficient...
Longbi Lin, Ness B. Shroff, R. Srikant