Sciweavers

4307 search results - page 557 / 862
» Dynamic Spyware Analysis
Sort
View
CASES
2006
ACM
15 years 10 months ago
Methods for power optimization in distributed embedded systems with real-time requirements
Dynamic voltage scaling and sleep state control have been shown to be extremely effective in reducing energy consumption in CMOS circuits. Though plenty of research papers have st...
Razvan Racu, Arne Hamann, Rolf Ernst, Bren Mochock...
VR
2000
IEEE
174views Virtual Reality» more  VR 2000»
15 years 8 months ago
Optimization-Based Virtual Surface Contact Manipulation at Force Control Rates
Previous interactive works have used springs, heuristics, and dynamics for surface placement applications. We present an analytical technique for kilohertz rate manipulation of CA...
Donald D. Nelson, Elaine Cohen
140
Voted
DATAMINE
2006
130views more  DATAMINE 2006»
15 years 4 months ago
Mining Adaptive Ratio Rules from Distributed Data Sources
Different from traditional association-rule mining, a new paradigm called Ratio Rule (RR) was proposed recently. Ratio rules are aimed at capturing the quantitative association kno...
Jun Yan, Ning Liu, Qiang Yang, Benyu Zhang, QianSh...
BMCBI
2007
148views more  BMCBI 2007»
15 years 4 months ago
Computation of significance scores of unweighted Gene Set Enrichment Analyses
Background: Gene Set Enrichment Analysis (GSEA) is a computational method for the statistical evaluation of sorted lists of genes or proteins. Originally GSEA was developed for in...
Andreas Keller, Christina Backes, Hans-Peter Lenho...
148
Voted
ICIP
2003
IEEE
16 years 5 months ago
Watermarking with knowledge of image database
The goal of this paper is to study how a-prior knowledge of the image database could be exploited for better watermarking performance. Unlike most formulations, where the encoder ...
S. Roy, E.-C. Chang