Sciweavers

4790 search results - page 198 / 958
» Reverse Query Processing
Sort
View
118
Voted
INDIASE
2009
ACM
15 years 9 months ago
Computing dynamic clusters
When trying to reverse engineer software, execution trace analysis is increasingly used. Though, by using this technique we are quickly faced with an enormous amount of data that ...
Philippe Dugerdil, Sebastien Jossi
122
Voted
ICDCS
2008
IEEE
15 years 9 months ago
Enabling Accurate Node Control in Randomized Duty Cycling Networks
— In this paper, we propose a novel duty cycling algorithm for large-scale dense wireless sensor networks. The proposed algorithm is based on a social behavior of nodes in the se...
Kang-Won Lee, Vasileios Pappas, Asser N. Tantawi
DRM
2005
Springer
15 years 8 months ago
Control flow based obfuscation
A software obfuscator is a program O to transform a source program P for protection against malicious reverse engineering. O should be correct (O(P) has same functionality with P)...
Jun Ge, Soma Chaudhuri, Akhilesh Tyagi
127
Voted
MDM
2005
Springer
118views Communications» more  MDM 2005»
15 years 8 months ago
kNR-tree: a novel R-tree-based index for facilitating spatial window queries on any k relations among N spatial relations in mob
The ever-increasing popularity of mobile applications coupled with the prevalence of spatial data has created the need for efficient processing of spatial queries in mobile enviro...
Anirban Mondal, Anthony K. H. Tung, Masaru Kitsure...
106
Voted
JCDL
2006
ACM
71views Education» more  JCDL 2006»
15 years 8 months ago
Using controlled query generation to evaluate blind relevance feedback algorithms
Currently in document retrieval there are many algorithms each with different strengths and weakness. There is some difficulty, however, in evaluating the impact of the test quer...
Chris Jordan, Carolyn R. Watters, Qigang Gao