Sciweavers

398 search results - page 59 / 80
» A multiview approach for intelligent data analysis based on ...
Sort
View
NDSS
2009
IEEE
14 years 2 months ago
K-Tracer: A System for Extracting Kernel Malware Behavior
Kernel rootkits can provide user level-malware programs with the additional capabilities of hiding their malicious activities by altering the legitimate kernel behavior of an oper...
Andrea Lanzi, Monirul I. Sharif, Wenke Lee
ADMI
2009
Springer
14 years 2 months ago
A Sequence Mining Method to Predict the Bidding Strategy of Trading Agents
Abstract. In this work, we describe the process used in order to predict the bidding strategy of trading agents. This was done in the context of the Reverse TAC, or CAT, game of th...
Vivia Nikolaidou, Pericles A. Mitkas
NETWORKING
2011
12 years 10 months ago
The Problem of Sensing Unused Cellular Spectrum
Abstract. Sensing mechanisms that estimate the occupancy of wireless spectrum are crucial to the success of approaches based on Dynamic Spectrum Access. In this paper, we present k...
Daniel Willkomm, Sridhar Machiraju, Jean Bolot, Ad...
CJ
1999
87views more  CJ 1999»
13 years 7 months ago
Evolution-Based Scheduling of Computations and Communications on Distributed Memory Multicomputers
We present a compiler optimization approach that uses the simulated evolution (SE) paradigm to enhance the finish time of heuristically scheduled computations with communication t...
Mayez A. Al-Mouhamed
IJSNET
2007
97views more  IJSNET 2007»
13 years 7 months ago
Stochastic binary sensor networks for noisy environments
— This paper proposes a stochastic framework for detecting anomalies or gathering interesting events in a noisy environment using a sensor network consisting of binary sensors. A...
T. Nguyen, Dong Nguyen, Huaping Liu, Duc A. Tran