Sciweavers

20778 search results - page 3811 / 4156
» Algorithms for Data Migration
Sort
View
HT
2009
ACM
15 years 2 months ago
Games with a purpose for social networking platforms
The online games market has matured in recent years. It is now a multi-billion dollar business with hundreds of millions players worldwide. At the same time, social networking pla...
Walter Rafelsberger, Arno Scharl
IADIS
2009
15 years 2 months ago
Trash article detection using categorization techniques
We explore techniques for detecting news articles containing invalid information, using the help of text categorization technology. The information that exists on the World Wide W...
Christos Bouras, Vassilis Tsogkas, Vassilis Poulop...
157
Voted
ICC
2009
IEEE
130views Communications» more  ICC 2009»
15 years 2 months ago
Verification of Secret Key Generation from UWB Channel Observations
Theoretical models of ultrawideband (UWB) radio channels indicate that pairs of UWB radio transceivers measure their common radio channel with a high degree of agreement and third ...
Masoud Ghoreishi Madiseh, Shuai He, Michael L. McG...
ICC
2009
IEEE
164views Communications» more  ICC 2009»
15 years 2 months ago
Static Analysis of Executables for Collaborative Malware Detection on Android
Smartphones are getting increasingly popular and several malwares appeared targeting these devices. General countermeasures to smartphone malwares are currently limited to signatur...
Aubrey-Derrick Schmidt, Rainer Bye, Hans-Gunther S...
ICCV
2009
IEEE
15 years 2 months ago
A robust boosting tracker with minimum error bound in a co-training framework
The varying object appearance and unlabeled data from new frames are always the challenging problem in object tracking. Recently machine learning methods are widely applied to tra...
Rong Liu, Jian Cheng, Hanqing Lu
« Prev « First page 3811 / 4156 Last » Next »