Sciweavers

4972 search results - page 861 / 995
» Ranking on graph data
Sort
View
WISTP
2010
Springer
15 years 11 months ago
A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones
Widespread use and general purpose computing capabilities of next generation smartphones make them the next big targets of malicious software (malware) and security attacks. Given ...
Tansu Alpcan, Christian Bauckhage, Aubrey-Derrick ...
DASFAA
2009
IEEE
96views Database» more  DASFAA 2009»
15 years 11 months ago
Materialized View Selection in XML Databases
Materialized views, a rdbms silver bullet, demonstrate its efficacy in many applications, especially as a data warehousing/decison support system tool. The pivot of playing materia...
Nan Tang, Jeffrey Xu Yu, Hao Tang, M. Tamer Ö...
SP
2009
IEEE
262views Security Privacy» more  SP 2009»
15 years 11 months ago
Automatic Reverse Engineering of Malware Emulators
Malware authors have recently begun using emulation technology to obfuscate their code. They convert native malware binaries into bytecode programs written in a randomly generated...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...
152
Voted
DAGM
2009
Springer
15 years 11 months ago
Self-Organizing Maps for Pose Estimation with a Time-of-Flight Camera
We describe a technique for estimating human pose from an image sequence captured by a time-of-flight camera. The pose estimation is derived from a simple model of the human body ...
Martin Haker, Martin Böhme, Thomas Martinetz,...
137
Voted
JSSPP
2009
Springer
15 years 11 months ago
Job Admission and Resource Allocation in Distributed Streaming Systems
Abstract. This paper describes a new and novel scheme for job admission and resource allocation employed by the SODA scheduler in System S. Capable of processing enormous quantitie...
Joel L. Wolf, Nikhil Bansal, Kirsten Hildrum, Suja...