Sciweavers

2311 search results - page 458 / 463
» Robustness and Generalization
Sort
View
MOBISYS
2011
ACM
14 years 2 months ago
Security versus energy tradeoffs in host-based mobile malware detection
The rapid growth of mobile malware necessitates the presence of robust malware detectors on mobile devices. However, running malware detectors on mobile devices may drain their ba...
Jeffrey Bickford, H. Andrés Lagar-Cavilla, ...
MOBISYS
2011
ACM
14 years 2 months ago
Indoor localization without infrastructure using the acoustic background spectrum
We introduce a new technique for determining a mobile phone’s indoor location even when Wi-Fi infrastructure is unavailable or sparse. Our technique is based on a new ambient so...
Stephen P. Tarzia, Peter A. Dinda, Robert P. Dick,...
PAMI
2011
14 years 2 months ago
Higher-Dimensional Affine Registration and Vision Applications
—Affine registration has a long and venerable history in computer vision literature, and in particular, extensive work has been done for affine registration in IR2 and IR3 . This...
S. M. Nejhum Shahed, Yu-Tseh Chi, Jeffrey Ho, Ming...
SIGECOM
2011
ACM
259views ECommerce» more  SIGECOM 2011»
14 years 2 months ago
Designing adaptive trading agents
ended abstract summarizes the research presented in Dr. Pardoe’s recently-completed Ph.D. thesis [Pardoe 2011]. The thesis considers how adaptive trading agents can take advantag...
David Pardoe, Peter Stone
SIGMETRICS
2011
ACM
229views Hardware» more  SIGMETRICS 2011»
14 years 2 months ago
Model-driven optimization of opportunistic routing
Opportunistic routing aims to improve wireless performance by exploiting communication opportunities arising by chance. A key challenge in opportunistic routing is how to achieve ...
Eric Rozner, Mi Kyung Han, Lili Qiu, Yin Zhang