Sciweavers

26496 search results - page 5181 / 5300
» An Approach to Computing Ethics
Sort
View
JCDL
2010
ACM
199views Education» more  JCDL 2010»
15 years 3 months ago
Crowdsourcing the assembly of concept hierarchies
The“wisdom of crowds”is accomplishing tasks that are cumbersome for individuals yet cannot be fully automated by means of specialized computer algorithms. One such task is the...
Kai Eckert, Mathias Niepert, Christof Niemann, Cam...
PLDI
2010
ACM
15 years 3 months ago
Finding low-utility data structures
Many opportunities for easy, big-win, program optimizations are missed by compilers. This is especially true in highly layered Java applications. Often at the heart of these misse...
Guoqing Xu, Nick Mitchell, Matthew Arnold, Atanas ...
TRUST
2010
Springer
15 years 3 months ago
Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform
Abstract. Increasing adoption of smartphones in recent times has begun to attract more and more malware writers towards these devices. Among the most prominent and widely adopted o...
Mohammad Nauman, Sohail Khan, Xinwen Zhang, Jean-P...
ICARCV
2002
IEEE
109views Robotics» more  ICARCV 2002»
15 years 2 months ago
Quantized wavelet features and support vector machines for on-road vehicle detection
The focus of this work is on the problem of feature selection and classification for on-road vehicle detection. In particular, we propose using quantized Haar wavelet features an...
Zehang Sun, George Bebis, Ronald Miller
ICNP
2002
IEEE
15 years 2 months ago
QoS Extension to BGP
To enable the end-to-end Quality of Service (QoS) guarantees in the Internet, based on the Border Gateway Protocol (BGP), inter-domain QoS advertising and routing are important. H...
Li Xiao, King-Shan Lui, Jun Wang, Klara Nahrstedt
« Prev « First page 5181 / 5300 Last » Next »