Sciweavers

6409 search results - page 1173 / 1282
» A Computational Algorithm for Origami Design
Sort
View
WISEC
2010
ACM
15 years 4 months ago
pBMDS: a behavior-based malware detection system for cellphone devices
Computing environments on cellphones, especially smartphones, are becoming more open and general-purpose, thus they also become attractive targets of malware. Cellphone malware no...
Liang Xie, Xinwen Zhang, Jean-Pierre Seifert, Senc...
VEE
2009
ACM
172views Virtualization» more  VEE 2009»
15 years 4 months ago
Entropy: a consolidation manager for clusters
Clusters provide powerful computing environments, but in practice much of this power goes to waste, due to the static allocation of tasks to nodes, regardless of their changing co...
Fabien Hermenier, Xavier Lorca, Jean-Marc Menaud, ...
CCECE
2009
IEEE
15 years 4 months ago
Estimation of boundary properties using stochastic differential equations
The inverse diffusion problems deal with the estimation of many crucial parameters such as the diffusion coefficient, source properties, and boundary conditions. Such algorithms ...
Ashraf Atalla, Aleksandar Jeremic
CIKM
2009
Springer
15 years 4 months ago
Incremental query evaluation for support vector machines
Support vector machines (SVMs) have been widely used in multimedia retrieval to learn a concept in order to find the best matches. In such a SVM active learning environment, the ...
Danzhou Liu, Kien A. Hua
ISMAR
2006
IEEE
15 years 3 months ago
Implementation of god-like interaction techniques for supporting collaboration between outdoor AR and indoor tabletop users
This paper presents a new interaction metaphor we have termed “god-like interaction”. This is a metaphor for improved communication of situational and navigational information...
Aaron Stafford, Wayne Piekarski, Bruce H. Thomas
« Prev « First page 1173 / 1282 Last » Next »