Sciweavers

6631 search results - page 1273 / 1327
» Challenges from Information Extraction to Information Fusion
Sort
View
114
Voted
MOBISYS
2008
ACM
16 years 5 days ago
Cascadia: a system for specifying, detecting, and managing rfid events
Cascadia is a system that provides RFID-based pervasive computing applications with an infrastructure for specifying, extracting and managing meaningful high-level events from raw...
Evan Welbourne, Nodira Khoussainova, Julie Letchne...
PAM
2010
Springer
15 years 7 months ago
Network DVR: A Programmable Framework for Application-Aware Trace Collection
Network traces are essential for a wide range of network applications, including traffic analysis, network measurement, performance monitoring, and security analysis. Existing cap...
Chia-Wei Chang, Alexandre Gerber, Bill Lin, Subhab...
GECCO
2009
Springer
138views Optimization» more  GECCO 2009»
15 years 7 months ago
IMAD: in-execution malware analysis and detection
The sophistication of computer malware is becoming a serious threat to the information technology infrastructure, which is the backbone of modern e-commerce systems. We, therefore...
Syed Bilal Mehdi, Ajay Kumar Tanwani, Muddassar Fa...
90
Voted
PIMRC
2008
IEEE
15 years 7 months ago
Network-Assisted Wireless Computing
Abstract—Multimedia applications for mobile devices are increasing and growing more sophisticated. Many of these applications require computationally intensive processing, such a...
Carri W. Chan, Nicholas Bambos, Jatinder Pal Singh
125
Voted
WCRE
2006
IEEE
15 years 6 months ago
Animated Visualization of Software History using Evolution Storyboards
The understanding of the structure of a software system can be improved by analyzing the system’s evolution during development. Visualizations of software history that provide o...
Dirk Beyer, Ahmed E. Hassan
« Prev « First page 1273 / 1327 Last » Next »