Sciweavers

204 search results - page 40 / 41
» Information Operator Scheduling by Genetic Algorithms
Sort
View
GECCO
2009
Springer
138views Optimization» more  GECCO 2009»
14 years 1 days ago
IMAD: in-execution malware analysis and detection
The sophistication of computer malware is becoming a serious threat to the information technology infrastructure, which is the backbone of modern e-commerce systems. We, therefore...
Syed Bilal Mehdi, Ajay Kumar Tanwani, Muddassar Fa...
TVCG
2010
147views more  TVCG 2010»
13 years 3 months ago
"behaviorism": a framework for dynamic data visualization
— While a number of information visualization software frameworks exist, creating new visualizations, especially those that involve novel visualization metaphors, interaction tec...
Angus Forbes, Tobias Höllerer, George Legrady
CVPR
2009
IEEE
14 years 9 days ago
Optimal scanning for faster object detection
Recent years have seen the development of fast and accurate algorithms for detecting objects in images. However, as the size of the scene grows, so do the running-times of these a...
Nicholas J. Butko, Javier R. Movellan
MOBICOM
2009
ACM
13 years 12 months ago
Lifetime and coverage guarantees through distributed coordinate-free sensor activation
Wireless Sensor Networks are emerging as a key sensing technology, with diverse military and civilian applications. In these networks, a large number of sensors perform distribute...
Gaurav S. Kasbekar, Yigal Bejerano, Saswati Sarkar
PVLDB
2010
128views more  PVLDB 2010»
13 years 3 months ago
Update Rewriting and Integrity Constraint Maintenance in a Schema Evolution Support System: PRISM++
Supporting legacy applications when the database schema evolves represents a long-standing challenge of practical and theoretical importance. Recent work has produced algorithms a...
Carlo Curino, Hyun Jin Moon, Alin Deutsch, Carlo Z...