Sciweavers

13043 search results - page 2372 / 2609
» Simulation of the research process
Sort
View
VIROLOGY
2010
179views more  VIROLOGY 2010»
15 years 2 months ago
Automatic binary deobfuscation
Abstract. This paper gives an overview of our research in the automation of the process of software protection analysis. We will focus more particularly on the problem of obfuscati...
Yoann Guillot, Alexandre Gazet
150
Voted
VTC
2010
IEEE
207views Communications» more  VTC 2010»
15 years 2 months ago
The Design and Implementation of IEEE 802.21 and Its Application on Wireless VoIP
—Supporting a multimode mobile device to seamlessly switch its connections between various wireless access networks, such as WiMAX, Wi-Fi, and LTE, is an important research issue...
Tein-Yaw Chung, Yung-Mu Chen, Pu-Chen Mao, Chen-Ku...
152
Voted
INLG
2010
Springer
15 years 1 months ago
Finding Common Ground: Towards a Surface Realisation Shared Task
In many areas of NLP reuse of utility tools such as parsers and POS taggers is now common, but this is still rare in NLG. The subfield of surface realisation has perhaps come clos...
Anja Belz, Mike White, Josef van Genabith, Deirdre...
236
Voted
MM
2010
ACM
271views Multimedia» more  MM 2010»
15 years 1 months ago
Large-scale music tag recommendation with explicit multiple attributes
Social tagging can provide rich semantic information for largescale retrieval in music discovery. Such collaborative intelligence, however, also generates a high degree of tags un...
Zhendong Zhao, Xinxi Wang, Qiaoliang Xiang, Andy M...
143
Voted
SIGMOD
2010
ACM
199views Database» more  SIGMOD 2010»
15 years 1 months ago
Keyword search across databases and documents
Given the continuous growth of databases and the abundance of diverse files in modern IT environments, there is a pressing need to integrate keyword search on heterogeneous inform...
Carlos Garcia-Alvarado, Carlos Ordonez
« Prev « First page 2372 / 2609 Last » Next »