Sciweavers

1150 search results - page 200 / 230
» Performance Evaluation and Improvement of Algorithmic Approa...
Sort
View
ACSAC
2006
IEEE
14 years 2 months ago
PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware
Modern malware often hide the malicious portion of their program code by making it appear as data at compiletime and transforming it back into executable code at runtime. This obf...
Paul Royal, Mitch Halpin, David Dagon, Robert Edmo...
JCDL
2006
ACM
172views Education» more  JCDL 2006»
14 years 2 months ago
A comprehensive comparison study of document clustering for a biomedical digital library MEDLINE
Document clustering has been used for better document retrieval, document browsing, and text mining in digital library. In this paper, we perform a comprehensive comparison study ...
Illhoi Yoo, Xiaohua Hu
ISMAR
2005
IEEE
14 years 2 months ago
Adaptive Line Tracking with Multiple Hypotheses for Augmented Reality
We present a real-time model-based line tracking approach with adaptive learning of image edge features that can handle partial occlusion and illumination changes. A CAD (VRML) mo...
Harald Wuest, Florent Vial, Didier Stricker
SC
2005
ACM
14 years 2 months ago
Automatic Tuning of Inlining Heuristics
Inlining improves the performance of programs by reducing the overhead of method invocation and increasing the opportunities for compiler optimization. Incorrect inlining decision...
John Cavazos, Michael F. P. O'Boyle
JCDL
2010
ACM
259views Education» more  JCDL 2010»
14 years 1 months ago
Exploiting time-based synonyms in searching document archives
Query expansion of named entities can be employed in order to increase the retrieval effectiveness. A peculiarity of named entities compared to other vocabulary terms is that they...
Nattiya Kanhabua, Kjetil Nørvåg