Sciweavers

85 search results - page 14 / 17
» Mimimorphism: a new approach to binary code obfuscation
Sort
View
IJON
2006
103views more  IJON 2006»
13 years 9 months ago
Evolutionary system for automatically constructing and adapting radial basis function networks
This article presents a new system for automatically constructing and training radial basis function networks based on original evolutionary computing methods. This system, called...
Daniel Manrique, Juan Rios, Alfonso Rodrígu...
IFSA
2003
Springer
179views Fuzzy Logic» more  IFSA 2003»
14 years 2 months ago
A CHC Evolutionary Algorithm for 3D Image Registration
Image registration has been a very active research area in the computer vision community. In the last few years, there is an increasing interest on the application of Evolutionary ...
Oscar Cordón, Sergio Damas, Jose Santamar&i...
DSN
2008
IEEE
13 years 11 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
ACMMSP
2005
ACM
99views Hardware» more  ACMMSP 2005»
14 years 3 months ago
Gated memory control for memory monitoring, leak detection and garbage collection
ct In the past, program monitoring often operates at the code level, performing checks at function and loop boundaries. Recent research shows that profiling analysis can identify ...
Chen Ding, Chengliang Zhang, Xipeng Shen, Mitsunor...
CVPR
2009
IEEE
15 years 4 months ago
Efficient Scale Space Auto-Context for Image Segmentation and Labeling
The Conditional Random Fields (CRF) model, using patch-based classification bound with context information, has recently been widely adopted for image segmentation/ labeling. In...
Jiayan Jiang (UCLA), Zhuowen Tu (UCLA)