Sciweavers

490 search results - page 86 / 98
» Operations on Records
Sort
View
SP
2007
IEEE
135views Security Privacy» more  SP 2007»
14 years 1 months ago
Exploring Multiple Execution Paths for Malware Analysis
Malicious code (or malware) is defined as software that fulfills the deliberately harmful intent of an attacker. Malware analysis is the process of determining the behavior and ...
Andreas Moser, Christopher Krügel, Engin Kird...
HOPL
2007
13 years 11 months ago
AppleScript
AppleScript is a scripting language and environment for the Mac OS. Originally conceived in 1989, AppleScript allows end-users to automate complex tasks and customize Mac OS appli...
William R. Cook
ISCAS
2008
IEEE
134views Hardware» more  ISCAS 2008»
14 years 2 months ago
Bidirectionally decodable Wyner-Ziv video coding
Abstract— Inter frame prediction technique significantly improves the compression efficiency in the hybrid video coding schemes. However, this technique causes the decoding dep...
Xiaopeng Fan, Oscar C. Au, Yan Chen, Jiantao Zhou,...
ACL
1998
13 years 9 months ago
Learning Intonation Rules for Concept to Speech Generation
In this paper, we report on an effort to provide a general-purpose spoken language generation tool for Concept-to-Speech (CTS) applications by extending a widely used text generat...
Shimei Pan, Kathleen McKeown
JKM
2006
135views more  JKM 2006»
13 years 7 months ago
Learning from the Mars Rover Mission: scientific discovery, learning and memory
Purpose Knowledge management for space exploration is part of a multi-generational effort. Each mission builds on knowledge from prior missions, and learning is the first step in ...
Charlotte Linde