Sciweavers

30 search results - page 3 / 6
» An Empirical Study of Utility Measures for k-Anonymisation
Sort
View
POST
2012
162views more  POST 2012»
12 years 1 months ago
Revisiting Botnet Models and Their Implications for Takedown Strategies
Abstract. Several works have utilized network models to study peerto-peer botnets, particularly in evaluating the effectiveness of strategies aimed at taking down a botnet. We obs...
Ting-Fang Yen, Michael K. Reiter
SDM
2010
SIAM
181views Data Mining» more  SDM 2010»
13 years 7 months ago
A Compression Based Distance Measure for Texture
The analysis of texture is an important subroutine in application areas as diverse as biology, medicine, robotics, and forensic science. While the last three decades have seen ext...
Bilson J. L. Campana, Eamonn J. Keogh
IMC
2010
ACM
13 years 4 months ago
Network traffic characteristics of data centers in the wild
Although there is tremendous interest in designing improved networks for data centers, very little is known about the network-level traffic characteristics of current data centers...
Theophilus Benson, Aditya Akella, David A. Maltz
EDM
2009
127views Data Mining» more  EDM 2009»
13 years 4 months ago
How do Students Organize Personal Information Spaces?
The purpose of this study is to empirically reveal strategies of students' organization of learning-related digital materials within an online personal information archive. Re...
Sharon Hardof-Jaffe, Arnon Hershkovitz, Hama Abu-K...
ICSE
2008
IEEE-ACM
14 years 6 months ago
A value-based approach for documenting design decisions rationale: a replicated experiment
The explicit documentation of the rationale of design decisions is a practice generally encouraged but rarely implemented in industry because of a variety of inhibitors. Known met...
Davide Falessi, Rafael Capilla, Giovanni Cantone