Sciweavers

8068 search results - page 1517 / 1614
» Java Data Objects
Sort
View
CC
2009
Springer
106views System Software» more  CC 2009»
15 years 11 months ago
Blind Optimization for Exploiting Hardware Features
Software systems typically exploit only a small fraction of the realizable performance from the underlying microprocessors. While there has been much work on hardware-aware optimiz...
Dan Knights, Todd Mytkowicz, Peter F. Sweeney, Mic...
CRV
2009
IEEE
184views Robotics» more  CRV 2009»
15 years 11 months ago
IceSynth: An Image Synthesis System for Sea-Ice Segmentation Evaluation
An ongoing challenge in automatic sea-ice monitoring using synthetic aperture radar (SAR) is the automatic segmentation of SAR sea-ice images based on the underlying ice type. Giv...
Alexander Wong, Wen Zhang, David A. Clausi
INFOCOM
2009
IEEE
15 years 11 months ago
Mobility-Driven Scheduling in Wireless Networks
—The design of scheduling policies for wireless data systems has been driven by a compromise between the objectives of high overall system throughput and the degree of fairness a...
Sem C. Borst, Nidhi Hegde, Alexandre Proutiere
GECCO
2009
Springer
15 years 11 months ago
Multiobjectivization for parameter estimation: a case-study on the segment polarity network of drosophila
Mathematical modeling for gene regulative networks (GRNs) provides an effective tool for hypothesis testing in biology. A necessary step in setting up such models is the estimati...
Tim Hohm, Eckart Zitzler
RAID
2009
Springer
15 years 11 months ago
PE-Miner: Mining Structural Information to Detect Malicious Executables in Realtime
In this paper, we present an accurate and realtime PE-Miner framework that automatically extracts distinguishing features from portable executables (PE) to detect zero-day (i.e. pr...
M. Zubair Shafiq, S. Momina Tabish, Fauzan Mirza, ...
« Prev « First page 1517 / 1614 Last » Next »