Sciweavers

1397 search results - page 247 / 280
» Dynamic power management using machine learning
Sort
View
CMS
2010
207views Communications» more  CMS 2010»
14 years 9 months ago
Statistical Detection of Malicious PE-Executables for Fast Offline Analysis
While conventional malware detection approaches increasingly fail, modern heuristic strategies often perform dynamically, which is not possible in many applications due to related ...
Ronny Merkel, Tobias Hoppe, Christian Krätzer...
BIOADIT
2004
Springer
15 years 1 months ago
An Artificial Immune System Approach to Misbehavior Detection in Mobile Ad Hoc Networks
Abstract. In mobile ad-hoc networks, nodes act both as terminals and information relays, and participate in a common routing protocol, such as Dynamic Source Routing (DSR). The net...
Jean-Yves Le Boudec, Slavisa Sarafijanovic
TMI
2010
208views more  TMI 2010»
14 years 4 months ago
Patient-Specific Modeling and Quantification of the Aortic and Mitral Valves From 4-D Cardiac CT and TEE
As decisions in cardiology increasingly rely on non-invasive methods, fast and precise image processing tools have become a crucial component of the analysis workflow. To the best ...
Razvan Ioan Ionasec, Ingmar Voigt, Bogdan Georgesc...
102
Voted
SASN
2004
ACM
15 years 2 months ago
Revisiting random key pre-distribution schemes for wireless sensor networks
Key management is one of the fundamental building blocks of security services. In a network with resource constrained nodes like sensor networks, traditional key management techni...
Joengmin Hwang, Yongdae Kim
EXPCS
2007
15 years 1 months ago
The user in experimental computer systems research
Experimental computer systems research typically ignores the end-user, modeling him, if at all, in overly simple ways. We argue that this (1) results in inadequate performance eva...
Peter A. Dinda, Gokhan Memik, Robert P. Dick, Bin ...