Sciweavers

726 search results - page 127 / 146
» Reverse engineering: a roadmap
Sort
View
ACSAC
2004
IEEE
14 years 1 months ago
Static Analyzer of Vicious Executables (SAVE)
Software security assurance and malware (trojans, worms, and viruses, etc.) detection are important topics of information security. Software obfuscation, a general technique that ...
Andrew H. Sung, Jianyun Xu, Patrick Chavez, Sriniv...
ECBS
2004
IEEE
129views Hardware» more  ECBS 2004»
14 years 1 months ago
Using Feature Modeling for Program Comprehension and Software Architecture Recovery
: The available evidence in a legacy software system, which can help in its understanding and recovery of its architecture are not always sufficient. Very often the system's d...
Ilian Pashov, Matthias Riebisch
GECCO
2006
Springer
202views Optimization» more  GECCO 2006»
14 years 1 months ago
Inference of genetic networks using S-system: information criteria for model selection
In this paper we present an evolutionary approach for inferring the structure and dynamics in gene circuits from observed expression kinetics. For representing the regulatory inte...
Nasimul Noman, Hitoshi Iba
SGP
2004
14 years 7 days ago
Shape Segmentation Using Local Slippage Analysis
We propose a method for segmentation of 3D scanned shapes into simple geometric parts. Given an input point cloud, our method computes a set of components which possess one or mor...
Natasha Gelfand, Leonidas J. Guibas
AAAI
2008
14 years 5 days ago
Proactive Intrusion Detection
Machine learning systems are deployed in many adversarial conditions like intrusion detection, where a classifier has to decide whether a sequence of actions come from a legitimat...
Benjamin Liebald, Dan Roth, Neelay Shah, Vivek Sri...