Sciweavers

5153 search results - page 860 / 1031
» Introduction to Randomized Algorithms
Sort
View
SP
2009
IEEE
262views Security Privacy» more  SP 2009»
15 years 9 months ago
Automatic Reverse Engineering of Malware Emulators
Malware authors have recently begun using emulation technology to obfuscate their code. They convert native malware binaries into bytecode programs written in a randomly generated...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...
ISCC
2009
IEEE
152views Communications» more  ISCC 2009»
15 years 9 months ago
Perceptual based voice multi-hop transmission over wireless sensor networks
Abstract—Multimedia applications over wireless sensor networks (WSNs) are rapidly gaining interest by the research community in order to develop new and mission critical services...
M. Petracca, G. Litovsky, A. Rinotti, Marco Tacca,...
ICDM
2009
IEEE
205views Data Mining» more  ICDM 2009»
15 years 9 months ago
Active Selection of Sensor Sites in Remote Sensing Applications
— In a data-mining approach, a model for estimation of Aerosol Optical Depth (AOD) from satellite observations is learned using collocated satellite and groundbased observations....
Debasish Das, Zoran Obradovic, Slobodan Vucetic
INFOCOM
2009
IEEE
15 years 9 months ago
Prize-Collecting Data Fusion for Cost-Performance Tradeoff in Distributed Inference
—A novel formulation for optimal sensor selection and in-network fusion for distributed inference known as the prizecollecting data fusion (PCDF) is proposed in terms of optimal ...
Animashree Anandkumar, Meng Wang, Lang Tong, Anant...
IROS
2009
IEEE
165views Robotics» more  IROS 2009»
15 years 9 months ago
Autonomous altitude estimation of a UAV using a single onboard camera
Abstract— Autonomous estimation of the altitude of an Unmanned Aerial Vehicle (UAV) is extremely important when dealing with flight maneuvers like landing, steady flight, etc. ...
Anoop Cherian, Jonathan Andersh, Vassilios Morella...