Sciweavers

6693 search results - page 1133 / 1339
» On an anytime algorithm for control
Sort
View
IEEEARES
2010
IEEE
14 years 1 months ago
Detection of Spyware by Mining Executable Files
Spyware represents a serious threat to confidentiality since it may result in loss of control over private data for computer users. This type of software might collect the data and...
Raja Khurram Shahzad, Syed Imran Haider, Niklas La...
BIBE
2009
IEEE
185views Bioinformatics» more  BIBE 2009»
14 years 1 months ago
Anomaly-free Prediction of Gene Ontology Annotations Using Bayesian Networks
Gene and protein structural and functional annotations expressed through controlled terminologies and ontologies are paramount especially for the aim of inferring new biomedical k...
Marco Tagliasacchi, Marco Masseroli
DATE
2010
IEEE
156views Hardware» more  DATE 2010»
14 years 1 months ago
Domain specific architecture for next generation wireless communication
—In order to solve the challenges in processor design for the next generation wireless communication systems, this paper first proposes a system level design flow for communicati...
Botao Zhang, Hengzhu Liu, Heng Zhao, Fangzheng Mo,...
3DPVT
2002
IEEE
172views Visualization» more  3DPVT 2002»
14 years 1 months ago
3D objects visualization for remote interactive medical applications
3D medical images produced in health centers represent tremendous amounts of data spread over different places. Automatic processing of these data often allow quantitative and rep...
Johan Montagnat, Eduardo Davila, Isabelle E. Magni...
DANCE
2002
IEEE
14 years 1 months ago
Active Names: Flexible Location and Transport of Wide-Area Resources
In this paper, we explore flexible name resolution as a way of supporting extensibility for wide-area distributed services. Our approach, called Active Names, maps names to a cha...
Amin Vahdat, Michael Dahlin, Thomas E. Anderson, A...
« Prev « First page 1133 / 1339 Last » Next »