Sciweavers

384 search results - page 44 / 77
» Automatic framework generation for hard real-time applicatio...
Sort
View
ADC
2009
Springer
134views Database» more  ADC 2009»
14 years 3 months ago
Mobile Information Exchange and Integration: From Query to Application Layer
Due to the popularity of mobile devices, more and more commercial applications have been developed on these devices. While commercial applications are mostly backed by relational ...
Van T. K. Tran, Raymond K. Wong, William K. Cheung...
KDD
2003
ACM
266views Data Mining» more  KDD 2003»
14 years 9 months ago
Applying data mining in investigating money laundering crimes
In this paper, we study the problem of applying data mining to facilitate the investigation of money laundering crimes (MLCs). We have identified a new paradigm of problems --- th...
Zhongfei (Mark) Zhang, John J. Salerno, Philip S. ...
IJCV
1998
238views more  IJCV 1998»
13 years 8 months ago
Feature Detection with Automatic Scale Selection
The fact that objects in the world appear in different ways depending on the scale of observation has important implications if one aims at describing them. It shows that the not...
Tony Lindeberg
ICCS
2007
Springer
14 years 22 days ago
Building Verifiable Sensing Applications Through Temporal Logic Specification
Abstract. Sensing is at the core of virtually every DDDAS application. Sensing applications typically involve distributed communication and coordination over large self-organized n...
Asad Awan, Ahmed H. Sameh, Suresh Jagannathan, Ana...
NDSS
2008
IEEE
14 years 3 months ago
Limits of Learning-based Signature Generation with Adversaries
Automatic signature generation is necessary because there may often be little time between the discovery of a vulnerability, and exploits developed to target the vulnerability. Mu...
Shobha Venkataraman, Avrim Blum, Dawn Song