Sciweavers

420 search results - page 48 / 84
» Isosurface Computation Made Simple
Sort
View
WORM
2003
13 years 9 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
EACL
1993
ACL Anthology
13 years 9 months ago
A Tradeoff between Compositionality and Complexity in the Semantics of Dimensional Adjectives
Linguistic access to uncertain quantitative knowledge about physical properties is provided by dimensional adjectives, e.g. long-short in the spatial and temporal senses, near-far...
Geoffrey Simmons
CEC
2008
IEEE
13 years 7 months ago
Regulation of gene regulation - smooth binding with dynamic affinity affects evolvability
Abstract-- Understanding the evolvability of simple differentiating multicellular systems is a fundamental problem in the biology of genetic regulatory networks and in computationa...
Johannes F. Knabe, Chrystopher L. Nehaniv, Maria J...
CEE
2010
119views more  CEE 2010»
13 years 7 months ago
Block-matching-based motion field generation utilizing directional edge displacement
A motion field generation algorithm using block matching of edge-flag histograms has been developed aiming at its application to motion recognition systems. Use of edge flags inste...
Hitoshi Hayakawa, Tadashi Shibata
CCE
2008
13 years 7 months ago
Chemical supply chain network optimization
Chemical supply chain networks provide large opportunities for cost reductions through the redesign of the flow of material from producer to customer. In this paper we present a m...
Jeff Ferrio, John Wassick