Sciweavers

1560 search results - page 263 / 312
» Robust Evolution Strategies
Sort
View
ICARIS
2009
Springer
14 years 4 months ago
A Sense of 'Danger' for Windows Processes
The sophistication of modern computer malware demands run-time malware detection strategies which are not only efficient but also robust to obfuscation and evasion attempts. In thi...
Salman Manzoor, M. Zubair Shafiq, S. Momina Tabish...
ICIAR
2009
Springer
14 years 4 months ago
Structured Light Stereoscopic Imaging with Dynamic Pseudo-random Patterns
Abstract. Structured light stereoscopic imaging offers an efficient and affordable solution to 3D modeling of objects. The majority of structured light patterns that have been prop...
Pierre Payeur, Danick Desjardins
OTM
2009
Springer
14 years 4 months ago
CLON: Overlay Networks and Gossip Protocols for Cloud Environments
Although epidemic or gossip-based multicast is a robust and scalable approach to reliable data dissemination, its inherent redundancy results in high resource consumption on both ...
Miguel Matos, António Sousa, José Pe...
SIGCOMM
2009
ACM
14 years 4 months ago
Epothecary: cost-effective drug pedigree tracking and authentication using mobile phones
Counterfeit and expired pharmaceuticals are a significant problem in the developing world, constituting up to 80% of stock on pharmacy shelves. This is due both to poor existing ...
Michael Paik, Jay Chen, Lakshminarayanan Subramani...
DSN
2008
IEEE
14 years 4 months ago
Trace-based microarchitecture-level diagnosis of permanent hardware faults
As devices continue to scale, future shipped hardware will likely fail due to in-the-field hardware faults. As traditional redundancy-based hardware reliability solutions that ta...
Man-Lap Li, Pradeep Ramachandran, Swarup Kumar Sah...