Sciweavers

848 search results - page 79 / 170
» Understanding Obfuscated Code
Sort
View
EUROCAST
2005
Springer
97views Hardware» more  EUROCAST 2005»
14 years 4 months ago
Extracting Computer Algebra Programs from Statements
In this paper, an approach to synthesize correct programs from specifications is presented. The idea is to extract code from definitions appearing in statements which have been me...
Jesús Aransay, Clemens Ballarin, Julio Rubi...
CIS
2005
Springer
14 years 4 months ago
MFCC and SVM Based Recognition of Chinese Vowels
Abstract. The recognition of vowels in Chinese speech is very important for Chinese speech recognition and understanding. However, it is rather difficult and there has been no effi...
Fuhai Li, Jinwen Ma, Dezhi Huang
WCRE
2002
IEEE
14 years 4 months ago
Generation of Architectural Documentation Using XML
Documentation generation is the process of creating the ocumentation at different levels of abstraction from the source code for a legacy system. The main goal is to help the stak...
Claudio Riva, Yaojin Yang
CRYPTO
2000
Springer
89views Cryptology» more  CRYPTO 2000»
14 years 3 months ago
On the Round Security of Symmetric-Key Cryptographic Primitives
We put forward a new model for understanding the security of symmetric-key primitives, such as block ciphers. The model captures the fact that many such primitives often consist of...
Zulfikar Ramzan, Leonid Reyzin
ECML
1998
Springer
14 years 3 months ago
Learning to Classify X-Ray Images Using Relational Learning
: Image understanding often requires extensive background knowledge. The problem addressed in this paper is such knowledge can be acquired. We discuss how relational machine learni...
Claude Sammut, Tatjana Zrimec