Sciweavers

8068 search results - page 1325 / 1614
» Java Data Objects
Sort
View
128
Voted
USENIX
2007
15 years 6 months ago
Dynamic Spyware Analysis
Spyware is a class of malicious code that is surreptitiously installed on victims’ machines. Once active, it silently monitors the behavior of users, records their web surfing ...
Manuel Egele, Christopher Kruegel, Engin Kirda, He...
147
Voted
KDD
2010
ACM
245views Data Mining» more  KDD 2010»
15 years 5 months ago
Learning incoherent sparse and low-rank patterns from multiple tasks
We consider the problem of learning incoherent sparse and lowrank patterns from multiple tasks. Our approach is based on a linear multi-task learning formulation, in which the spa...
Jianhui Chen, Ji Liu, Jieping Ye
129
Voted
FLAIRS
2004
15 years 5 months ago
The Mobile Agents Integrated Field Test
The Mobile Agents model-based, distributed architecture, which integrates diverse components in a system for lunar and planetary surface operations, was extensively tested in a tw...
William J. Clancey, Maarten Sierhuis, Rich Alena, ...
146
Voted
CCCG
2001
15 years 5 months ago
Line voronoi diagram based interpolation and application to digital terrain modelling
Local coordinates based on the Voronoi diagram are used in natural neighbour interpolation to quantify the "neighbourliness" of data sites. In an earlier paper, we have ...
Francois Anton, Darka Mioc, Christopher M. Gold
142
Voted
USITS
2001
15 years 5 months ago
CANS: Composable, Adaptive Network Services Infrastructure
Ubiquitous access to sophisticated internet services from diverse end devices across heterogeneous networks requires the injection of additional functionality into the network to ...
Xiaodong Fu, Weisong Shi, Anatoly Akkerman, Vijay ...
« Prev « First page 1325 / 1614 Last » Next »