Sciweavers

13553 search results - page 2558 / 2711
» A Generalized Multi-View Approach
Sort
View
GECCO
2009
Springer
193views Optimization» more  GECCO 2009»
15 years 8 months ago
Optimization of dynamic memory managers for embedded systems using grammatical evolution
New portable consumer embedded devices must execute multimedia applications (e.g., 3D games, video players and signal processing software, etc.) that demand extensive memory acces...
José L. Risco-Martín, David Atienza,...
125
Voted
HUC
2009
Springer
15 years 8 months ago
From spaces to places: emerging contexts in mobile privacy
Mobile privacy concerns are central to Ubicomp and yet remain poorly understood. We advocate a diversified approach, enabling the cross-interpretation of data from complementary m...
Clara Mancini, Keerthi Thomas, Yvonne Rogers, Blai...
157
Voted
HUC
2009
Springer
15 years 8 months ago
Simultaneous localization and mapping for pedestrians using only foot-mounted inertial sensors
In this paper we describe a new Bayesian estimation approach for simultaneous mapping and localization for pedestrians based on odometry with foot mounted inertial sensors. When s...
Patrick Robertson, Michael Angermann, Bernhard Kra...
KDD
2009
ACM
191views Data Mining» more  KDD 2009»
15 years 8 months ago
Improving data mining utility with projective sampling
Overall performance of the data mining process depends not just on the value of the induced knowledge but also on various costs of the process itself such as the cost of acquiring...
Mark Last
120
Voted
KDD
2009
ACM
173views Data Mining» more  KDD 2009»
15 years 8 months ago
Malware detection using statistical analysis of byte-level file content
Commercial anti-virus software are unable to provide protection against newly launched (a.k.a “zero-day”) malware. In this paper, we propose a novel malware detection techniqu...
S. Momina Tabish, M. Zubair Shafiq, Muddassar Faro...
« Prev « First page 2558 / 2711 Last » Next »