Sciweavers

298 search results - page 28 / 60
» Towards experimental evaluation of code obfuscation techniqu...
Sort
View
KDD
2009
ACM
189views Data Mining» more  KDD 2009»
14 years 3 months ago
CoCo: coding cost for parameter-free outlier detection
How can we automatically spot all outstanding observations in a data set? This question arises in a large variety of applications, e.g. in economy, biology and medicine. Existing ...
Christian Böhm, Katrin Haegler, Nikola S. M&u...
PLDI
2005
ACM
14 years 2 months ago
Jungloid mining: helping to navigate the API jungle
Reuse of existing code from class libraries and frameworks is often difficult because APIs are complex and the client code required to use the APIs can be hard to write. We obser...
David Mandelin, Lin Xu, Rastislav Bodík, Do...
LCPC
2000
Springer
14 years 6 days ago
Improving Offset Assignment for Embedded Processors
Embedded systems consisting of the application program ROM, RAM, the embedded processor core, and any custom hardware on a single wafer are becoming increasingly common in applicat...
Sunil Atri, J. Ramanujam, Mahmut T. Kandemir
APSEC
2004
IEEE
14 years 11 days ago
Binary-Level Lightweight Data Integration to Develop Program Understanding Tools for Embedded Software in C
In embedded software development, the programming language C and inline assembly code are traditionally widely used. However, tools for C program-understanding, e.g., cross-refere...
Katsuhiko Gondow, Tomoya Suzuki II, Hayato Kawashi...
CIVR
2007
Springer
195views Image Analysis» more  CIVR 2007»
14 years 2 months ago
Towards optimal bag-of-features for object categorization and semantic video retrieval
Bag-of-features (BoF) deriving from local keypoints has recently appeared promising for object and scene classification. Whether BoF can naturally survive the challenges such as ...
Yu-Gang Jiang, Chong-Wah Ngo, Jun Yang 0003