Sciweavers

4307 search results - page 639 / 862
» Dynamic Spyware Analysis
Sort
View
EUROSYS
2011
ACM
13 years 1 months ago
CloneCloud: elastic execution between mobile device and cloud
Mobile applications are becoming increasingly ubiquitous and provide ever richer functionality on mobile devices. At the same time, such devices often enjoy strong connectivity wi...
Byung-Gon Chun, Sunghwan Ihm, Petros Maniatis, May...
NAR
2011
234views Computer Vision» more  NAR 2011»
13 years 1 months ago
The UCSC cancer genomics browser: update 2011
The UCSC Cancer Genomics Browser (https:// genome-cancer.ucsc.edu) comprises a suite of web-based tools to integrate, visualize and analyze cancer genomics and clinical data. The ...
J. Zachary Sanborn, Stephen C. Benz, Brian Craft, ...
PLDI
2011
ACM
13 years 1 months ago
EnerJ: approximate data types for safe and general low-power computation
Energy is increasingly a first-order concern in computer systems. Exploiting energy-accuracy trade-offs is an attractive choice in applications that can tolerate inaccuracies. Re...
Adrian Sampson, Werner Dietl, Emily Fortuna, Danus...
ICCV
2011
IEEE
12 years 10 months ago
iGroup : Weakly supervised image and video grouping
We present a generic, efficient and iterative algorithm for interactively clustering classes of images and videos. The approach moves away from the use of large hand labelled tra...
Andrew Gilbert, Richard Bowden
BIRTHDAY
2011
Springer
12 years 10 months ago
Algorithmic Aspects of Risk Management
Abstract. Risk analysis has been used to manage the security of systems for several decades. However, its use has been limited to offline risk computation and manual response. In c...
Ashish Gehani, Lee Zaniewski, K. Subramani