Sciweavers

5473 search results - page 1042 / 1095
» On the graph isomorphism problem
Sort
View
VIROLOGY
2010
179views more  VIROLOGY 2010»
13 years 9 months ago
Automatic binary deobfuscation
Abstract. This paper gives an overview of our research in the automation of the process of software protection analysis. We will focus more particularly on the problem of obfuscati...
Yoann Guillot, Alexandre Gazet
ICCAD
2009
IEEE
117views Hardware» more  ICCAD 2009»
13 years 8 months ago
Binning optimization based on SSTA for transparently-latched circuits
With increasing process variation, binning has become an important technique to improve the values of fabricated chips, especially in high performance microprocessors where transpa...
Min Gong, Hai Zhou, Jun Tao, Xuan Zeng
TCSV
2010
13 years 5 months ago
Face and Human Gait Recognition Using Image-to-Class Distance
We propose a new distance measure for face recognition and human gait recognition. Each probe image (a face image or an average human silhouette image) is represented as a set of ...
Yi Huang, Dong Xu, Tat-Jen Cham
KDD
2012
ACM
271views Data Mining» more  KDD 2012»
12 years 1 months ago
GigaTensor: scaling tensor analysis up by 100 times - algorithms and discoveries
Many data are modeled as tensors, or multi dimensional arrays. Examples include the predicates (subject, verb, object) in knowledge bases, hyperlinks and anchor texts in the Web g...
U. Kang, Evangelos E. Papalexakis, Abhay Harpale, ...
MOBIHOC
2008
ACM
14 years 10 months ago
Multicast capacity for hybrid wireless networks
We study the multicast capacity of a random wireless network consisting of ordinary wireless nodes and base stations, known as a hybrid network. Assume that n ordinary wireless no...
XuFei Mao, Xiang-Yang Li, ShaoJie Tang
« Prev « First page 1042 / 1095 Last » Next »