Sciweavers

18090 search results - page 3503 / 3618
» Computing by Only Observing
Sort
View
PLDI
2010
ACM
15 years 9 months ago
Finding low-utility data structures
Many opportunities for easy, big-win, program optimizations are missed by compilers. This is especially true in highly layered Java applications. Often at the heart of these misse...
Guoqing Xu, Nick Mitchell, Matthew Arnold, Atanas ...
TRUST
2010
Springer
15 years 9 months ago
Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform
Abstract. Increasing adoption of smartphones in recent times has begun to attract more and more malware writers towards these devices. Among the most prominent and widely adopted o...
Mohammad Nauman, Sohail Khan, Xinwen Zhang, Jean-P...
ACSAC
2002
IEEE
15 years 9 months ago
Safe Virtual Execution Using Software Dynamic Translation
Safe virtual execution (SVE) allows a host computer system to reduce the risks associated with running untrusted programs. SVE prevents untrusted programs from directly accessing ...
Kevin Scott, Jack W. Davidson
ICARCV
2002
IEEE
109views Robotics» more  ICARCV 2002»
15 years 9 months ago
Quantized wavelet features and support vector machines for on-road vehicle detection
The focus of this work is on the problem of feature selection and classification for on-road vehicle detection. In particular, we propose using quantized Haar wavelet features an...
Zehang Sun, George Bebis, Ronald Miller
ICPPW
2002
IEEE
15 years 9 months ago
Hebbian Algorithms for a Digital Library Recommendation System
generally meta-data, so that documents on any specific subject can be transparently retrieved. While quality control can in principle still rely on the traditional methods of peer-...
Francis Heylighen, Johan Bollen
« Prev « First page 3503 / 3618 Last » Next »