Sciweavers

773 search results - page 142 / 155
» Traversing the Machining Graph
Sort
View
USS
2004
13 years 11 months ago
Static Disassembly of Obfuscated Binaries
Disassembly is the process of recovering a symbolic representation of a program's machine code instructions from its binary representation. Recently, a number of techniques h...
Christopher Krügel, William K. Robertson, Fre...
NIPS
2003
13 years 11 months ago
An Improved Scheme for Detection and Labelling in Johansson Displays
Consider a number of moving points, where each point is attached to a joint of the human body and projected onto an image plane. Johannson showed that humans can effortlessly det...
Claudio Fanti, Marzia Polito, Pietro Perona
ICMCS
2010
IEEE
198views Multimedia» more  ICMCS 2010»
13 years 10 months ago
Naming persons in news video with label propagation
Labeling persons appearing in video frames with names detected from the video transcript helps improving the video content identification and search task. We develop a face naming...
Phi The Pham, Marie-Francine Moens, Tinne Tuytelaa...
CORR
2010
Springer
100views Education» more  CORR 2010»
13 years 9 months ago
Products of Weighted Logic Programs
Abstract. Weighted logic programming, a generalization of bottom-up logic programming, is a successful framework for specifying dynamic programming algorithms. In this setting, pro...
Shay B. Cohen, Robert J. Simmons, Noah A. Smith
AI
2006
Springer
13 years 9 months ago
Controlled generation of hard and easy Bayesian networks: Impact on maximal clique size in tree clustering
This article presents and analyzes algorithms that systematically generate random Bayesian networks of varying difficulty levels, with respect to inference using tree clustering. ...
Ole J. Mengshoel, David C. Wilkins, Dan Roth