Sciweavers

5344 search results - page 893 / 1069
» Privacy-Preserving Set Operations
Sort
View
140
Voted
CCGRID
2010
IEEE
15 years 4 months ago
A High-Level Interpreted MPI Library for Parallel Computing in Volunteer Environments
Idle desktops have been successfully used to run sequential and master-slave task parallel codes on a large scale in the context of volunteer computing. However, execution of messa...
Troy P. LeBlanc, Jaspal Subhlok, Edgar Gabriel
141
Voted
GECCO
2008
Springer
206views Optimization» more  GECCO 2008»
15 years 4 months ago
Improving accuracy of immune-inspired malware detectors by using intelligent features
In this paper, we show that a Bio-inspired classifier’s accuracy can be dramatically improved if it operates on intelligent features. We propose a novel set of intelligent feat...
M. Zubair Shafiq, Syed Ali Khayam, Muddassar Faroo...
155
Voted
MM
2010
ACM
198views Multimedia» more  MM 2010»
15 years 3 months ago
Social pixels: genesis and evaluation
Huge amounts of social multimedia is being created daily by a combination of globally distributed disparate sensors, including human-sensors (e.g. tweets) and video cameras. Taken...
Vivek K. Singh, Mingyan Gao, Ramesh Jain
115
Voted
MOBICOM
2010
ACM
15 years 3 months ago
Intentional networking: opportunistic exploitation of mobile network diversity
Mobile devices face a diverse and dynamic set of networking options. Using those options to the fullest requires knowledge of application intent. This paper describes Intentional ...
Brett D. Higgins, Azarias Reda, Timur Alperovich, ...
SAC
2010
ACM
15 years 3 months ago
Improving the efficiency of dynamic malware analysis
Each day, security companies see themselves confronted with thousands of new malware programs. To cope with these large quantities, researchers and practitioners alike have develo...
Ulrich Bayer, Engin Kirda, Christopher Kruegel