Sciweavers

181 search results - page 36 / 37
» An Integrated Approach of Learning, Planning, and Execution
Sort
View
P2P
2006
IEEE
229views Communications» more  P2P 2006»
13 years 11 months ago
Cost-Aware Processing of Similarity Queries in Structured Overlays
Large-scale distributed data management with P2P systems requires the existence of similarity operators for queries as we cannot assume that all users will agree on exactly the sa...
Marcel Karnstedt, Kai-Uwe Sattler, Manfred Hauswir...
KDD
2007
ACM
566views Data Mining» more  KDD 2007»
14 years 5 months ago
IMDS: intelligent malware detection system
The proliferation of malware has presented a serious threat to the security of computer systems. Traditional signature-based antivirus systems fail to detect polymorphic and new, ...
Yanfang Ye, Dingding Wang, Tao Li, Dongyi Ye
ACMDIS
2006
ACM
13 years 11 months ago
Design research for a context-aware capture system to support biology education
Automatic capture technology could enable students to record and index much information—both digital and nondigital—with little extra effort. Can this technology be designed t...
Abe Crystal
PVLDB
2010
175views more  PVLDB 2010»
13 years 3 months ago
Dynamic Join Optimization in Multi-Hop Wireless Sensor Networks
To enable smart environments and self-tuning data centers, we are developing the Aspen system for integrating physical sensor data, as well as stream data coming from machine logi...
Svilen R. Mihaylov, Marie Jacob, Zachary G. Ives, ...
CCS
2010
ACM
13 years 3 months ago
The limits of automatic OS fingerprint generation
Remote operating system fingerprinting relies on implementation differences between OSs to identify the specific variant executing on a remote host. Because these differences can ...
David W. Richardson, Steven D. Gribble, Tadayoshi ...