Sciweavers

1016 search results - page 24 / 204
» Explore or Exploit
Sort
View
MICCAI
2005
Springer
14 years 10 months ago
Exploiting Temporal Information in Functional Magnetic Resonance Imaging Brain Data
Functional Magnetic Resonance Imaging(fMRI) has enabled scientists to look into the active human brain, leading to a flood of new data, thus encouraging the development of new data...
Lei Zhang 0002, Dimitris Samaras, Dardo Tomasi, Ne...
WIMOB
2008
IEEE
14 years 3 months ago
Exploiting Self-Reported Social Networks for Routing in Ubiquitous Computing Environments
— Mobile, delay-tolerant, ad hoc and pocket-switched networks may form an important part of future ubiquitous computing environments. Understanding how to efficiently and effect...
Greg Bigwood, D. Rehunathan, Martin Bateman, Trist...
IJDE
2006
95views more  IJDE 2006»
13 years 9 months ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum
CIKM
2010
Springer
13 years 7 months ago
Third workshop on exploiting semantic annotations in information retrieval (ESAIR): CIKM 2010 workshop
There is an increasing amount of structure on the Web as a result of modern Web languages, user tagging and annotation, and emerging robust NLP tools. These meaningful, semantic, ...
Jaap Kamps, Jussi Karlgren, Ralf Schenkel
DATE
2010
IEEE
118views Hardware» more  DATE 2010»
13 years 7 months ago
Exploiting multiple switch libraries in topology synthesis of on-chip interconnection network
Abstract—On-chip interconnection network is a crucial design component in high-performance System-on-Chips (SoCs). Many of previous works have focused on the automation of its to...
Minje Jun, Sungroh Yoon, Eui-Young Chung