Sciweavers

525 search results - page 61 / 105
» Using Checkable Types in Automatic Protocol Analysis
Sort
View
RAID
2005
Springer
14 years 2 months ago
Polymorphic Worm Detection Using Structural Information of Executables
Abstract. Network worms are malicious programs that spread automatically across networks by exploiting vulnerabilities that affect a large number of hosts. Because of the speed at...
Christopher Krügel, Engin Kirda, Darren Mutz,...
ICDAR
2009
IEEE
14 years 3 months ago
A Dual Taxonomy for Defects in Digitized Historical Photos
Old photos may be affected by several types of defects. Manual restorers use their own taxonomy to classify damages by which a photo is affected, in order to apply the proper rest...
Edoardo Ardizzone, A. De Polo, Haris Dindo, Giusep...
PLDI
2003
ACM
14 years 2 months ago
Checking and inferring local non-aliasing
In prior work [15] we studied a language construct restrict that allows programmers to specify that certain pointers are not aliased to other pointers used within a lexical scope....
Alexander Aiken, Jeffrey S. Foster, John Kodumal, ...
ICASSP
2009
IEEE
14 years 3 months ago
Minimum variance modulation filter for robust speech recognition
This paper describes a way of designing modulation filter by datadriven analysis which improves the performance of automatic speech recognition systems that operate in real envir...
Yu-Hsiang Bosco Chiu, Richard M. Stern
ISMIR
2005
Springer
189views Music» more  ISMIR 2005»
14 years 2 months ago
Instrument Identification in Polyphonic Music: Feature Weighting with Mixed Sounds, Pitch-Dependent Timbre Modeling, and Use of
This paper addresses the problem of identifying musical instruments in polyphonic music. Musical instrument identification (MII) is an improtant task in music information retriev...
Tetsuro Kitahara, Masataka Goto, Kazunori Komatani...