Sciweavers

1056 search results - page 96 / 212
» Identifying and Exploiting Ultrametricity
Sort
View
SENSYS
2005
ACM
14 years 3 months ago
Cyclops: in situ image sensing and interpretation in wireless sensor networks
Despite their increasing sophistication, wireless sensor networks still do not exploit the most powerful of the human senses: vision. Indeed, vision provides humans with unmatched...
Mohammad H. Rahimi, Rick Baer, Obimdinachi I. Iroe...
AIPS
1998
13 years 11 months ago
Solving Stochastic Planning Problems with Large State and Action Spaces
Planning methods for deterministic planning problems traditionally exploit factored representations to encode the dynamics of problems in terms of a set of parameters, e.g., the l...
Thomas Dean, Robert Givan, Kee-Eung Kim
RAID
2010
Springer
13 years 8 months ago
Detecting the Onset of Infection for Secure Hosts
Abstract. Software flaws in applications such as a browser may be exploited by attackers to launch drive-by-download (DBD), which has become the major vector of malware infection....
Kui Xu, Qiang Ma, Danfeng (Daphne) Yao
DAC
2008
ACM
14 years 11 months ago
Automated hardware-independent scenario identification
Scenario-based design exploits the time-varying execution behavior of applications by dynamically adapting the system on which they run. This is a particularly interesting design ...
Juan Hamers, Lieven Eeckhout
SIGMOD
2007
ACM
165views Database» more  SIGMOD 2007»
14 years 10 months ago
Sharing aggregate computation for distributed queries
An emerging challenge in modern distributed querying is to efficiently process multiple continuous aggregation queries simultaneously. Processing each query independently may be i...
Ryan Huebsch, Minos N. Garofalakis, Joseph M. Hell...