Sciweavers

5684 search results - page 968 / 1137
» Computing with active dendrites
Sort
View
ECAI
2010
Springer
15 years 5 months ago
Bayesian Monte Carlo for the Global Optimization of Expensive Functions
In the last decades enormous advances have been made possible for modelling complex (physical) systems by mathematical equations and computer algorithms. To deal with very long run...
Perry Groot, Adriana Birlutiu, Tom Heskes
GECON
2010
Springer
198views Business» more  GECON 2010»
15 years 5 months ago
Resource-Level QoS Metric for CPU-Based Guarantees in Cloud Providers
Success of Cloud computing requires that both customers and providers can be confident that signed Service Level Agreements (SLA) are supporting their respective business activitie...
Iñigo Goiri, Ferran Julià, Josep Ori...
DIMVA
2009
15 years 5 months ago
Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks
Drive-by download attacks are among the most common methods for spreading malware today. These attacks typically exploit memory corruption vulnerabilities in web browsers and brows...
Manuel Egele, Peter Wurzinger, Christopher Kruegel...
GECCO
2008
Springer
175views Optimization» more  GECCO 2008»
15 years 5 months ago
Non-genetic transmission of memes by diffusion
In recent years, there has been an increase in research activities on Memetic Algorithm (MA). MA works with memes; a meme being defined as “the basic unit of cultural transmiss...
Quang Huy Nguyen 0001, Yew-Soon Ong, Meng-Hiot Lim
ICMCS
2010
IEEE
199views Multimedia» more  ICMCS 2010»
15 years 5 months ago
MuViSync: Realtime music video alignment
In recent years, the popularity of compressed music files and online music downloads has increased dramatically. Today's users own large digital collections of high quality m...
Robert Macrae, Xavier Anguera, Nuria Oliver