Sciweavers

2745 search results - page 497 / 549
» A fast algorithm for computing large Fibonacci numbers
Sort
View
TSE
2010
230views more  TSE 2010»
14 years 11 months ago
Vulnerability Discovery with Attack Injection
The increasing reliance put on networked computer systems demands higher levels of dependability. This is even more relevant as new threats and forms of attack are constantly being...
João Antunes, Nuno Ferreira Neves, Miguel C...
IS
2011
14 years 8 months ago
Collection trees for event-monitoring queries
In this paper we present algorithms for building and maintaining efficient collection trees that provide the conduit to disseminate data required for processing monitoring queries...
Antonios Deligiannakis, Yannis Kotidis, Vassilis S...
ICIP
2006
IEEE
16 years 5 months ago
Two-Stage Optimal Component Analysis
Linear techniques are widely used to reduce the dimension of image representation spaces in applications such as image indexing and object recognition. Optimal Component Analysis ...
Yiming Wu, Xiuwen Liu, Washington Mio, Kyle A. Gal...
SIGMOD
2009
ACM
218views Database» more  SIGMOD 2009»
16 years 4 months ago
Exploring biomedical databases with BioNav
We demonstrate the BioNav system, a novel search interface for biomedical databases, such as PubMed. BioNav enables users to navigate large number of query results by categorizing...
Abhijith Kashyap, Vagelis Hristidis, Michalis Petr...
PERCOM
2003
ACM
16 years 3 months ago
Energy-Aware Target Localization in Wireless Sensor Networks
Wireless distributed sensor networks (DSNs) are important for a number of strategic applications such as coordinated target detection, surveillance, and localization. Energy is a ...
Yi Zou, Krishnendu Chakrabarty