This paper presents a novel method for CpG islands location identification based on conditional random fields (CRF) model. The method transforms CpG islands location identification into the problem of sequential data ...
详细信息
We present an automata-based model for describing the behaviors of software components. This extends our previous work by allowing internal behaviors. In order to improve the techniques for checking if two component c...
详细信息
For some sensor network applications, the problem of sweep coverage, which periodically covers POIs (Points of Interest) to sense events, is of importance. How to schedule minimum number of mobile sensors to achieve t...
详细信息
In order to maximize the lifetime of wireless sensor networks, while ensuring the monitoring quality for specific applications, we develop the sleep-wakeup algorithms for the sensor networks. Firstly, for the three-di...
详细信息
This paper introduces a flow based clustering algorithm for tourism search engine. Unlike the general tourism search engines such as ***, *** and *** etc. to return the users' queries huge amount of web page links...
详细信息
Reversing the syntactic format of program inputs and data structures in binaries plays a vital role for understanding program behaviors in many security *** this paper,we propose a collab.rative reversing technique by...
详细信息
Reversing the syntactic format of program inputs and data structures in binaries plays a vital role for understanding program behaviors in many security *** this paper,we propose a collab.rative reversing technique by capturing the mapping relationship between input fields and program data *** key insight behind our paper is that program uses corresponding data structures as references to parse and access different input fields,and every field could be identified by reversing its corresponding data *** details,we use a finegrained dynamic taint analysis to monitor the propagation of *** identifying base pointers for each input byte,we could reverse data structures and conversely identify fields based on their referencing data *** construct several experiments to evaluate the *** results show that our approach could effectively reverse precise input formats,and provide unique benefits to two representative security applications,exploit diagnosis and malware analysis.
Code completion is an integral component of modern integrated development environments, as it not only facilitates the software development process but also enhances the quality of software products. By leveraging lar...
详细信息
Dynamic taint analysis is an important technique for tracking information flow in software and it has been widely applied in the field of software testing, debugging and vulnerability detection. However, most of the d...
详细信息
Generalized learning is a kind of integrated machine learning methods, which combines symbolic learning with connective learning, fuzzy learning and evolutionlearning. This paper discusses the fundamental principle fo...
详细信息
ISBN:
(纸本)0780384075
Generalized learning is a kind of integrated machine learning methods, which combines symbolic learning with connective learning, fuzzy learning and evolutionlearning. This paper discusses the fundamental principle for generalized learning first. Then the generalized learning is introduced to remote sensing image recognition system (RSIRS for short) to obtain certain knowledge from training sample set for classification. The experiment result has shown the validity of generalized learning in knowledge discovering.
In order to extend the sensor’s lifetime, this paper researched deeply into the sleep scheduling mechanism in the distributed sensor network. Now, the commonly used sleep scheduling methods based on the coverage have...
详细信息
暂无评论