Sciweavers

2230 search results - page 288 / 446
» Reformulating Constraint Models Using Input Data
Sort
View
123
Voted
WSNA
2003
ACM
15 years 7 months ago
Analyzing and modeling encryption overhead for sensor network nodes
Recent research in sensor networks has raised security issues for small embedded devices. Security concerns are motivated by the deployment of a large number of sensory devices in...
Prasanth Ganesan, Ramnath Venugopalan, Pushkin Ped...
278
Voted
KDD
2012
ACM
292views Data Mining» more  KDD 2012»
13 years 5 months ago
Online allocation of display ads with smooth delivery
Display ads on the Internet are often sold in bundles of thousands or millions of impressions over a particular time period, typically weeks or months. Ad serving systems that ass...
Anand Bhalgat, Jon Feldman, Vahab S. Mirrokni
GI
2005
Springer
15 years 8 months ago
Distributed User Modeling for Situated Interaction
: A distributed service to model and control contextual information in mobile and ubiquitous computing environments is presented in this paper. We introduce the general user model ...
Dominik Heckmann
ECCV
2008
Springer
16 years 4 months ago
Discriminative Sparse Image Models for Class-Specific Edge Detection and Image Interpretation
Abstract. Sparse signal models learned from data are widely used in audio, image, and video restoration. They have recently been generalized to discriminative image understanding t...
Julien Mairal, Marius Leordeanu, Francis Bach, Mar...
103
Voted
ACSAC
2006
IEEE
15 years 8 months ago
Bluetooth Worms: Models, Dynamics, and Defense Implications
Recent occurrences of mobile worms like Cabir, Mabir and CommWarrior have created growing concerns over the security of data stored on mobile devices such as cell phones and PDAs....
Guanhua Yan, Stephan Eidenbenz