Sciweavers

8068 search results - page 1517 / 1614
» Java Data Objects
Sort
View
CC
2009
Springer
106views System Software» more  CC 2009»
15 years 4 months ago
Blind Optimization for Exploiting Hardware Features
Software systems typically exploit only a small fraction of the realizable performance from the underlying microprocessors. While there has been much work on hardware-aware optimiz...
Dan Knights, Todd Mytkowicz, Peter F. Sweeney, Mic...
CRV
2009
IEEE
184views Robotics» more  CRV 2009»
15 years 4 months ago
IceSynth: An Image Synthesis System for Sea-Ice Segmentation Evaluation
An ongoing challenge in automatic sea-ice monitoring using synthetic aperture radar (SAR) is the automatic segmentation of SAR sea-ice images based on the underlying ice type. Giv...
Alexander Wong, Wen Zhang, David A. Clausi
INFOCOM
2009
IEEE
15 years 4 months ago
Mobility-Driven Scheduling in Wireless Networks
—The design of scheduling policies for wireless data systems has been driven by a compromise between the objectives of high overall system throughput and the degree of fairness a...
Sem C. Borst, Nidhi Hegde, Alexandre Proutiere
GECCO
2009
Springer
15 years 4 months ago
Multiobjectivization for parameter estimation: a case-study on the segment polarity network of drosophila
Mathematical modeling for gene regulative networks (GRNs) provides an effective tool for hypothesis testing in biology. A necessary step in setting up such models is the estimati...
Tim Hohm, Eckart Zitzler
RAID
2009
Springer
15 years 4 months ago
PE-Miner: Mining Structural Information to Detect Malicious Executables in Realtime
In this paper, we present an accurate and realtime PE-Miner framework that automatically extracts distinguishing features from portable executables (PE) to detect zero-day (i.e. pr...
M. Zubair Shafiq, S. Momina Tabish, Fauzan Mirza, ...
« Prev « First page 1517 / 1614 Last » Next »