Sciweavers

1397 search results - page 152 / 280
» Dynamic power management using machine learning
Sort
View
115
Voted
SIGUCCS
2003
ACM
15 years 9 months ago
Integrating WebCT with diverse campus systems
The University of Delaware has a powerful legacy SIS system. The University plans to replace this system in 2004-05. In the meantime, we have populated WebCT rosters using custom ...
Jeff Whisler
138
Voted
WORM
2003
15 years 5 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
ICRA
2009
IEEE
188views Robotics» more  ICRA 2009»
15 years 10 months ago
Learning sound location from a single microphone
Abstract— We consider the problem of estimating the incident angle of a sound, using only a single microphone. The ability to perform monaural (single-ear) localization is import...
Ashutosh Saxena, Andrew Y. Ng
151
Voted
ICRA
2010
IEEE
164views Robotics» more  ICRA 2010»
15 years 2 months ago
Boundary detection based on supervised learning
— Detecting the boundaries of objects is a key step in separating foreground objects from the background, which is useful for robotics and computer vision applications, such as o...
Kiho Kwak, Daniel F. Huber, Jeongsook Chae, Takeo ...
139
Voted
COLT
2008
Springer
15 years 5 months ago
Adapting to a Changing Environment: the Brownian Restless Bandits
In the multi-armed bandit (MAB) problem there are k distributions associated with the rewards of playing each of k strategies (slot machine arms). The reward distributions are ini...
Aleksandrs Slivkins, Eli Upfal