Sciweavers

2446 search results - page 488 / 490
» Principles of dataspace systems
Sort
View
117
Voted
INFOCOM
2010
IEEE
14 years 11 months ago
Maximum Damage Malware Attack in Mobile Wireless Networks
—Malware attacks constitute a serious security risk that threatens to slow down the large scale proliferation of wireless applications. As a first step towards thwarting this se...
M. H. R. Khouzani, Saswati Sarkar, Eitan Altman
109
Voted
ACSD
2010
IEEE
251views Hardware» more  ACSD 2010»
14 years 10 months ago
Modular Interpretation of Heterogeneous Modeling Diagrams into Synchronous Equations Using Static Single Assignment
Abstract--The ANR project SPaCIFY develops a domainspecific programming environment, Synoptic, to engineer embedded software for space applications. Synoptic is an Eclipse-based mo...
Jean-Pierre Talpin, Julien Ouy, Thierry Gautier, L...
113
Voted

Publication
253views
14 years 10 months ago
Multisensory Oddity Detection as Bayesian Inference
A key goal for the perceptual system is to optimally combine information from all the senses that may be available in order to develop the most accurate and unified picture possi...
Timothy Hospedales and Sethu Vijayakumar
154
Voted
ICCV
2009
IEEE
14 years 10 months ago
Selection and context for action recognition
Recognizing human action in non-instrumented video is a challenging task not only because of the variability produced by general scene factors like illumination, background, occlu...
Dong Han, Liefeng Bo, Cristian Sminchisescu
120
Voted
ICDCS
2009
IEEE
14 years 10 months ago
The Case for Spam-Aware High Performance Mail Server Architecture
The email volume per mailbox has largely remained low and unchanged in the past several decades, and hence mail server performance has largely remained a secondary issue. The stee...
Abhinav Pathak, Syed Ali Raza Jafri, Y. Charlie Hu