Sciweavers

12148 search results - page 2352 / 2430
» Generalized Bundle Methods
Sort
View
CCS
2010
ACM
14 years 10 months ago
BLADE: an attack-agnostic approach for preventing drive-by malware infections
Web-based surreptitious malware infections (i.e., drive-by downloads) have become the primary method used to deliver malicious software onto computers across the Internet. To addr...
Long Lu, Vinod Yegneswaran, Phillip A. Porras, Wen...
MOBISYS
2010
ACM
15 years 6 days ago
MAUI: making smartphones last longer with code offload
This paper presents MAUI, a system that enables fine-grained energy-aware offload of mobile code to the infrastructure. Previous approaches to these problems either relied heavily...
Eduardo Cuervo, Aruna Balasubramanian, Dae-ki Cho,...
AI
2007
Springer
14 years 10 months ago
On the merging of Dung's argumentation systems
In this paper, the problem of deriving sensible information from a collection of argumentation systems coming from different agents is addressed. The underlying argumentation the...
Sylvie Coste-Marquis, Caroline Devred, Séba...
ALMOB
2008
112views more  ALMOB 2008»
14 years 10 months ago
Metabolite-based clustering and visualization of mass spectrometry data using one-dimensional self-organizing maps
Background: One of the goals of global metabolomic analysis is to identify metabolic markers that are hidden within a large background of data originating from high-throughput ana...
Peter Meinicke, Thomas Lingner, Alexander Kaever, ...
AMAI
2008
Springer
14 years 10 months ago
The giving tree: constructing trees for efficient offline and online multi-robot coverage
This paper discusses the problem of building efficient coverage paths for a team of robots. An efficient multi-robot coverage algorithm should result in a coverage path for every ...
Noa Agmon, Noam Hazon, Gal A. Kaminka
« Prev « First page 2352 / 2430 Last » Next »