Sciweavers

4688 search results - page 909 / 938
» Dynamics of Control
Sort
View
KDD
2009
ACM
181views Data Mining» more  KDD 2009»
14 years 3 months ago
Intelligent file scoring system for malware detection from the gray list
Currently, the most significant line of defense against malware is anti-virus products which focus on authenticating valid software from a white list, blocking invalid software f...
Yanfang Ye, Tao Li, Qingshan Jiang, Zhixue Han, Li...
SIGGRAPH
2010
ACM
14 years 3 months ago
The Frankencamera: an experimental platform for computational photography
Although there has been much interest in computational photography within the research and photography communities, progress has been hampered by the lack of a portable, programm...
Andrew Adams, Eino-Ville Talvala, Sung Hee Park, D...
LCTRTS
2001
Springer
14 years 3 months ago
Middleware For Building Adaptive Systems Via Configuration
1 COTS (commercial off-the-shelf) devices are capable of executing powerful, distributed algorithms. Very large, adaptive systems can be created by simply integrating these devices...
Sanjai Narain, Ravichander Vaidyanathan, Stanley M...
TES
2001
Springer
14 years 3 months ago
Security for Distributed E-Service Composition
Current developments show that tomorrow’s information systems and applications will no longer be based on monolithic architectures that encompass all the functionality. Rather, t...
Stefan Seltzsam, Stephan Börzsönyi, Alfo...
WADS
2001
Springer
182views Algorithms» more  WADS 2001»
14 years 3 months ago
On the Complexity of Scheduling Conditional Real-Time Code
Abstract. Many real-time embedded systems involve a collection of independently executing event-driven code blocks, having hard real-time constraints. Portions of such codes when t...
Samarjit Chakraborty, Thomas Erlebach, Lothar Thie...