Sciweavers

801 search results - page 96 / 161
» Robust Nonproprietary Software
Sort
View
INFOCOM
2011
IEEE
14 years 1 months ago
Secure and practical outsourcing of linear programming in cloud computing
—Cloud Computing has great potential of providing robust computational power to the society at reduced cost. It enables customers with limited computational resources to outsourc...
Cong Wang, Kui Ren, Jia Wang
MOBISYS
2011
ACM
14 years 22 days ago
Security versus energy tradeoffs in host-based mobile malware detection
The rapid growth of mobile malware necessitates the presence of robust malware detectors on mobile devices. However, running malware detectors on mobile devices may drain their ba...
Jeffrey Bickford, H. Andrés Lagar-Cavilla, ...
MOBISYS
2011
ACM
14 years 22 days ago
Indoor localization without infrastructure using the acoustic background spectrum
We introduce a new technique for determining a mobile phone’s indoor location even when Wi-Fi infrastructure is unavailable or sparse. Our technique is based on a new ambient so...
Stephen P. Tarzia, Peter A. Dinda, Robert P. Dick,...
NAR
2011
225views Computer Vision» more  NAR 2011»
14 years 22 days ago
Gramene database in 2010: updates and extensions
Now in its 10th year, the Gramene database (http:// www.gramene.org) has grown from its primary focus on rice, the first fully-sequenced grass genome, to become a resource for maj...
Ken Youens-Clark, Edward S. Buckler, Terry M. Cass...
SIGIR
2012
ACM
13 years 9 days ago
Time-based calibration of effectiveness measures
Many current effectiveness measures incorporate simplifying assumptions about user behavior. These assumptions prevent the measures from reflecting aspects of the search process...
Mark D. Smucker, Charles L. A. Clarke