Sciweavers

12301 search results - page 2244 / 2461
» Distributed Computation in Dynamic Networks
Sort
View
136
Voted
JIIS
2002
99views more  JIIS 2002»
15 years 3 months ago
Efficient Management of Persistent Knowledge
Although computer speed has steadily increased and memory is getting cheaper, the need for storage managers to deal efficiently with applications that cannot be held into main memo...
Dimitris G. Kapopoulos, Michael Hatzopoulos, Panag...
154
Voted
ISOLA
2010
Springer
15 years 2 months ago
Towards an Architecture for Runtime Interoperability
Abstract. Interoperability remains a fundamental challenge when connecting heterogeneous systems which encounter and spontaneously communicate with one another in pervasive computi...
Amel Bennaceur, Gordon S. Blair, Franck Chauvel, G...
200
Voted
WCRE
2010
IEEE
15 years 1 months ago
Reverse Engineering Self-Modifying Code: Unpacker Extraction
—An important application of binary-level reverse engineering is in reconstructing the internal logic of computer malware. Most malware code is distributed in encrypted (or “pa...
Saumya K. Debray, Jay Patel
138
Voted
DEBU
2010
127views more  DEBU 2010»
15 years 1 months ago
Provenance in ORCHESTRA
Sharing structured data today requires agreeing on a standard schema, then mapping and cleaning all of the data to achieve a single queriable mediated instance. However, for setti...
Todd J. Green, Grigoris Karvounarakis, Zachary G. ...
103
Voted
ICASSP
2011
IEEE
14 years 7 months ago
Improving text-independent phonetic segmentation based on the Microcanonical Multiscale Formalism
In an earlier work, we proposed a novel phonetic segmentation method based on speech analysis under the Microcanonical Multiscale Formalism (MMF). The latter relies on the computa...
Vahid Khanagha, Khalid Daoudi, Oriol Pont, Hussein...
« Prev « First page 2244 / 2461 Last » Next »