Sciweavers

284 search results - page 43 / 57
» Quantifying process equivalence based on observed behavior
Sort
View
ACSAC
2006
IEEE
14 years 1 months ago
PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware
Modern malware often hide the malicious portion of their program code by making it appear as data at compiletime and transforming it back into executable code at runtime. This obf...
Paul Royal, Mitch Halpin, David Dagon, Robert Edmo...
IPPS
2010
IEEE
13 years 5 months ago
Improving numerical reproducibility and stability in large-scale numerical simulations on GPUs
The advent of general purpose graphics processing units (GPGPU's) brings about a whole new platform for running numerically intensive applications at high speeds. Their multi-...
Michela Taufer, Omar Padron, Philip Saponaro, Sand...
TREC
1998
13 years 8 months ago
TREC-7 Evaluation of Conceptual Interlingua Document Retrieval (CINDOR) in English and French
: TextWise LLC. participated in the TREC-7 Cross-Language Retrieval track using the CINDOR system, which utilizes a "conceptual interlingua" representation of documents a...
Anne Diekema, Farhad Oroumchian, Paraic Sheridan, ...
ICIP
2010
IEEE
13 years 5 months ago
People identification using shadow dynamics
People identification has numerous applications, ranging from surveillance/security to robotics. Face and body movement/gait biometrics are the most important tools for this task....
Yumi Iwashita, Adrian Stoica, Ryo Kurazume
WSDM
2012
ACM
258views Data Mining» more  WSDM 2012»
12 years 3 months ago
Large-scale analysis of individual and task differences in search result page examination strategies
Understanding the impact of individual and task differences on search result page examination strategies is important in developing improved search engines. Characterizing these e...
Georg Buscher, Ryen W. White, Susan T. Dumais, Jef...