Sciweavers

20573 search results - page 3914 / 4115
» The Computer's New Clothes
Sort
View
PEPM
2010
ACM
14 years 7 months ago
Context-sensitive analysis of obfuscated x86 executables
A method for context-sensitive analysis of binaries that may have obfuscated procedure call and return operations is presented. Such binaries may use operators to directly manipul...
Arun Lakhotia, Davidson R. Boccardo, Anshuman Sing...

Dataset
924views
14 years 6 months ago
SCUT-COUCH2009 - A Comprehensive Online Unconstrained Handwriting Database
SCUT-COUCH 2009 database is a comprehensive database that consists of 12 datasets, namely GB1, GB2, TradGB1, Big5, Pinyin, Letters, Digit, Symbol, Word8888, Word17366, Word44208 an...
Lianwen Jin
WWW
2010
ACM
14 years 5 months ago
Measurement-calibrated graph models for social network experiments
Access to realistic, complex graph datasets is critical to research on social networking systems and applications. Simulations on graph data provide critical evaluation of new sys...
Alessandra Sala, Lili Cao, Christo Wilson, Robert ...
WWW
2010
ACM
14 years 5 months ago
Atomate it! end-user context-sensitive automation using heterogeneous information sources on the web
The transition of personal information management (PIM) tools off the desktop to the Web presents an opportunity to augment these tools with capabilities provided by the wealth o...
Max Van Kleek, Brennan Moore, David R. Karger, Pau...
VEE
2010
ACM
291views Virtualization» more  VEE 2010»
14 years 5 months ago
Neon: system support for derived data management
Modern organizations face increasingly complex information management requirements. A combination of commercial needs, legal liability and regulatory imperatives has created a pat...
Qing Zhang, John McCullough, Justin Ma, Nabil Sche...
« Prev « First page 3914 / 4115 Last » Next »