Sciweavers

225 search results - page 37 / 45
» Retargetable binary utilities
Sort
View
MOC
2002
131views more  MOC 2002»
13 years 7 months ago
Some baby-step giant-step algorithms for the low hamming weight discrete logarithm problem
In this paper, we present several baby-step giant-step algorithms for the low hamming weight discrete logarithm problem. In this version of the discrete log problem, we are require...
Douglas R. Stinson
RAID
2010
Springer
13 years 6 months ago
Automatic Discovery of Parasitic Malware
Malicious software includes functionality designed to block discovery or analysis by defensive utilities. To prevent correct attribution of undesirable behaviors to the malware, it...
Abhinav Srivastava, Jonathon T. Giffin
EMNLP
2009
13 years 5 months ago
Character-level Analysis of Semi-Structured Documents for Set Expansion
Set expansion refers to expanding a partial set of "seed" objects into a more complete set. One system that does set expansion is SEAL (Set Expander for Any Language), w...
Richard C. Wang, William W. Cohen
TIP
2010
170views more  TIP 2010»
13 years 2 months ago
A Distributed Topological Camera Network Representation for Tracking Applications
Abstract--Sensor networks have been widely used for surveillance, monitoring, and tracking. Camera networks, in particular, provide a large amount of information that has tradition...
Edgar J. Lobaton, Ramanarayan Vasudevan, Ruzena Ba...
SIGIR
2011
ACM
12 years 10 months ago
Collaborative competitive filtering: learning recommender using context of user choice
While a user’s preference is directly reflected in the interactive choice process between her and the recommender, this wealth of information was not fully exploited for learni...
Shuang-Hong Yang, Bo Long, Alexander J. Smola, Hon...