Sciweavers

12438 search results - page 2256 / 2488
» The Magic of a Number System
Sort
View
SP
2010
IEEE
194views Security Privacy» more  SP 2010»
15 years 8 months ago
Identifying Dormant Functionality in Malware Programs
—To handle the growing flood of malware, security vendors and analysts rely on tools that automatically identify and analyze malicious code. Current systems for automated malwar...
Paolo Milani Comparetti, Guido Salvaneschi, Engin ...
ICB
2007
Springer
207views Biometrics» more  ICB 2007»
15 years 8 months ago
Super-Resolved Faces for Improved Face Recognition from Surveillance Video
Characteristics of surveillance video generally include low resolution and poor quality due to environmental, storage and processing limitations. It is extremely difficult for comp...
Frank Lin, Clinton Fookes, Vinod Chandran, Sridha ...
ICCD
2007
IEEE
195views Hardware» more  ICCD 2007»
15 years 8 months ago
LEMap: Controlling leakage in large chip-multiprocessor caches via profile-guided virtual address translation
The emerging trend of larger number of cores or processors on a single chip in the server, desktop, and mobile notebook platforms necessarily demands larger amount of on-chip last...
Jugash Chandarlapati, Mainak Chaudhuri
AMR
2006
Springer
108views Multimedia» more  AMR 2006»
15 years 8 months ago
Variation of Relevance Assessments for Medical Image Retrieval
Abstract. Evaluation is crucial for the success of most research domains, and image retrieval is no exception to this. Recently, several benchmarks have been developed for visual i...
Henning Müller, Paul Clough, William R. Hersh...
BROADNETS
2004
IEEE
15 years 8 months ago
Random Asynchronous Wakeup Protocol for Sensor Networks
This paper presents Random Asynchronous Wakeup (RAW), a power saving technique for sensor networks that reduces energy consumption without significantly affecting the latency or c...
Vamsi Paruchuri, Shivakumar Basavaraju, Arjan Durr...
« Prev « First page 2256 / 2488 Last » Next »