Sciweavers

7536 search results - page 1446 / 1508
» Localized Components Analysis
Sort
View
RAID
2010
Springer
15 years 28 days ago
Detecting the Onset of Infection for Secure Hosts
Abstract. Software flaws in applications such as a browser may be exploited by attackers to launch drive-by-download (DBD), which has become the major vector of malware infection....
Kui Xu, Qiang Ma, Danfeng (Daphne) Yao
134
Voted
WIOPT
2010
IEEE
15 years 27 days ago
Minimizing transmission energy in sensor networks via trajectory control
—Energy optimization is a significant component of Wireless Sensor Network (WSN) design. In this paper we consider transmission energy optimization in WSNs where messages are co...
Delia Ciullo, Guner D. Celik, Eytan Modiano
128
Voted
CLOUDCOM
2010
Springer
15 years 17 days ago
Using Global Behavior Modeling to Improve QoS in Cloud Data Storage Services
Abstract--The cloud computing model aims to make largescale data-intensive computing affordable even for users with limited financial resources, that cannot invest into expensive i...
Jesús Montes, Bogdan Nicolae, Gabriel Anton...
127
Voted
ICIP
2010
IEEE
15 years 15 days ago
People identification using shadow dynamics
People identification has numerous applications, ranging from surveillance/security to robotics. Face and body movement/gait biometrics are the most important tools for this task....
Yumi Iwashita, Adrian Stoica, Ryo Kurazume
ICPADS
2010
IEEE
15 years 14 days ago
Utilizing RF Interference to Enable Private Estimation in RFID Systems
Counting or estimating the number of tags is crucial for RFID system. Researchers have proposed several fast cardinality estimation schemes to estimate the quantity of a batch of ...
Lei Yang, Jinsong Han, Yong Qi, Cheng Wang, Zhuo L...
« Prev « First page 1446 / 1508 Last » Next »