Sciweavers

8669 search results - page 1395 / 1734
» Computing matrix representations
Sort
View
NDSS
2008
IEEE
15 years 10 months ago
HookFinder: Identifying and Understanding Malware Hooking Behaviors
Installing various hooks into the victim system is an important attacking strategy employed by malware, including spyware, rootkits, stealth backdoors, and others. In order to def...
Heng Yin, Zhenkai Liang, Dawn Song
SASO
2008
IEEE
15 years 10 months ago
Pervasive Self-Learning with Multi-modal Distributed Sensors
Truly ubiquitous computing poses new and significant challenges. A huge number of heterogeneous devices will interact to perform complex distributed tasks. One of the key aspects...
Nicola Bicocchi, Marco Mamei, Andrea Prati, Rita C...
ACIVS
2008
Springer
15 years 10 months ago
Adaptive Metadata Management System for Distributed Video Content Analysis
Scientific advances in the development of video processing algorithms now allow various distributed and collaborative vision-based applications. However, the lack of recognised st...
C. Carincotte, Xavier Desurmont, A. Bastide
AINA
2007
IEEE
15 years 10 months ago
OWL-Based Context-Dependent Task Modeling and Deducing
In the near future, homes are envisioned to be equipped with numerous intelligent communicating devices. Such smart home needs to exhibit highly adaptive behavior to meet the inha...
Hongbo Ni, Xingshe Zhou, Zhiwen Yu, Kejian Miao
ARITH
2007
IEEE
15 years 10 months ago
A New Family of High.Performance Parallel Decimal Multipliers
This paper introduces two novel architectures for parallel decimal multipliers. Our multipliers are based on a new algorithm for decimal carry–save multioperand addition that us...
Álvaro Vázquez, Elisardo Antelo, Pao...
« Prev « First page 1395 / 1734 Last » Next »