Sciweavers

2614 search results - page 445 / 523
» Information System Architectures: From Art to Science
Sort
View
RAID
2010
Springer
13 years 6 months ago
Automatic Discovery of Parasitic Malware
Malicious software includes functionality designed to block discovery or analysis by defensive utilities. To prevent correct attribution of undesirable behaviors to the malware, it...
Abhinav Srivastava, Jonathon T. Giffin
PIMRC
2010
IEEE
13 years 5 months ago
Cognitive Beacon Channel via GSM and UMTS
This paper proposes the utilization of GSM logical channels (RACH, AGCH and TCH) and UMTS signaling (MIB and SIBs) of the Broadcast Channel to transmit a Cognitive Beacon Channel (...
Rodrigo Soule de Castro, Philippe Godlewski, Phili...
ISCA
2012
IEEE
237views Hardware» more  ISCA 2012»
11 years 10 months ago
BOOM: Enabling mobile memory based low-power server DIMMs
To address the real-time processing needs of large and growing amounts of data, modern software increasingly uses main memory as the primary data store for critical information. T...
Doe Hyun Yoon, Jichuan Chang, Naveen Muralimanohar...
ECBS
1996
IEEE
127views Hardware» more  ECBS 1996»
14 years 13 hour ago
Domain Engineering: The Challenge, Status, and Trends
Naval Surface Warfare Center Dahlgren Division; under joint sponsorship of the Office of Naval Research; the Naval Command, Control, and Ocean Surveillance Center; and the Naval S...
Stephanie White, Michael Edwards
HRI
2006
ACM
14 years 1 months ago
Using context and sensory data to learn first and second person pronouns
We present a method of grounded word learning that is powerful enough to learn the meanings of first and second person pronouns. The model uses the understood words in an utteran...
Kevin Gold, Brian Scassellati