Sciweavers

2200 search results - page 333 / 440
» The Generalized Pignistic Transformation
Sort
View
DRM
2005
Springer
14 years 2 months ago
Control flow based obfuscation
A software obfuscator is a program O to transform a source program P for protection against malicious reverse engineering. O should be correct (O(P) has same functionality with P)...
Jun Ge, Soma Chaudhuri, Akhilesh Tyagi
EMSOFT
2005
Springer
14 years 2 months ago
Synchronization of periodic clocks
We propose a programming model dedicated to real-time videostreaming applications for embedded media devices, including highdefinition TVs. This model is built on the synchronous...
Albert Cohen, Marc Duranton, Christine Eisenbeis, ...
ESTIMEDIA
2005
Springer
14 years 2 months ago
Custom Processor Design Using NISC: A Case-Study on DCT algorithm
Designing Application-Specific Instruction-set Processors (ASIPs) usually requires designing a custom datapath, and modifying instruction-set, instruction decoder, and compiler. A...
Bita Gorjiara, Daniel D. Gajski
GECCO
2005
Springer
139views Optimization» more  GECCO 2005»
14 years 2 months ago
Use of a genetic algorithm in brill's transformation-based part-of-speech tagger
The tagging problem in natural language processing is to find a way to label every word in a text as a particular part of speech, e.g., proper noun. An effective way of solving th...
Garnett Carl Wilson, Malcolm I. Heywood
IVA
2005
Springer
14 years 2 months ago
An Objective Character Believability Evaluation Procedure for Multi-agent Story Generation Systems
Abstract. The ability to generate narrative is of importance to computer systems that wish to use story effectively for entertainment, training, or education. One of the focuses of...
Mark O. Riedl, R. Michael Young