Sciweavers

10995 search results - page 2046 / 2199
» Positioning
Sort
View
171
Voted
DAC
2010
ACM
15 years 5 months ago
Instruction cache locking using temporal reuse profile
The performance of most embedded systems is critically dependent on the average memory access latency. Improving the cache hit rate can have significant positive impact on the per...
Yun Liang, Tulika Mitra
MM
2010
ACM
146views Multimedia» more  MM 2010»
15 years 5 months ago
W2Go: a travel guidance system by automatic landmark ranking
In this paper, we present a travel guidance system W 2Go (Where to Go), which can automatically recognize and rank the landmarks for travellers. In this system, a novel Automatic ...
Yue Gao, Jinhui Tang, Richang Hong, Qionghai Dai, ...
MOBICOM
2010
ACM
15 years 5 months ago
ZiFi: wireless LAN discovery via ZigBee interference signatures
WiFi networks have enjoyed an unprecedent penetration rate in recent years. However, due to the limited coverage, existing WiFi infrastructure only provides intermittent connectiv...
Ruogu Zhou, Yongping Xiong, Guoliang Xing, Limin S...
CCS
2010
ACM
15 years 5 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
159
Voted
CCS
2010
ACM
15 years 5 months ago
BLADE: an attack-agnostic approach for preventing drive-by malware infections
Web-based surreptitious malware infections (i.e., drive-by downloads) have become the primary method used to deliver malicious software onto computers across the Internet. To addr...
Long Lu, Vinod Yegneswaran, Phillip A. Porras, Wen...
« Prev « First page 2046 / 2199 Last » Next »