Sciweavers

7865 search results - page 1369 / 1573
» Large correlation analysis
Sort
View
NDSS
2008
IEEE
15 years 11 months ago
Automated Whitebox Fuzz Testing
Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally, fuzz testing tools apply random mutations to well-formed inputs of a progr...
Patrice Godefroid, Michael Y. Levin, David A. Moln...
PIMRC
2008
IEEE
15 years 11 months ago
Network-Assisted Wireless Computing
Abstract—Multimedia applications for mobile devices are increasing and growing more sophisticated. Many of these applications require computationally intensive processing, such a...
Carri W. Chan, Nicholas Bambos, Jatinder Pal Singh
ICDE
2007
IEEE
155views Database» more  ICDE 2007»
15 years 11 months ago
Query-Aware Sampling for Data Streams
Data Stream Management Systems are useful when large volumes of data need to be processed in real time. Examples include monitoring network traffic, monitoring financial transacti...
Theodore Johnson, S. Muthukrishnan, Vladislav Shka...
ICRA
2007
IEEE
175views Robotics» more  ICRA 2007»
15 years 11 months ago
Visual Servoing in Non-Rigid Environments: A Space-Time Approach
— Most robotic vision algorithms are proposed by envisaging robots operating in structured environments where the world is assumed to be rigid. These algorithms fail to provide o...
D. Santosh, C. V. Jawahar
INFOCOM
2007
IEEE
15 years 11 months ago
Near-Optimal Data Dissemination Policies for Multi-Channel, Single Radio Wireless Sensor Networks
Abstract—We analyze the performance limits of data dissemination with multi-channel, single radio sensors. We formulate the problem of minimizing the average delay of data dissem...
David Starobinski, Weiyao Xiao, Xiangping Qin, Ari...
« Prev « First page 1369 / 1573 Last » Next »