Sciweavers

9316 search results - page 143 / 1864
» Analysis of traceback techniques
Sort
View
CORR
2010
Springer
144views Education» more  CORR 2010»
15 years 1 months ago
An In-depth Analysis of Spam and Spammers
Electronic mail services have become an important source of communication for millions of people all over the world. Due to this tremendous growth, there has been a significant in...
Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran,...
170
Voted
SIGMOD
2012
ACM
220views Database» more  SIGMOD 2012»
13 years 6 months ago
GUPT: privacy preserving data analysis made easy
It is often highly valuable for organizations to have their data analyzed by external agents. However, any program that computes on potentially sensitive data risks leaking inform...
Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, D...
258
Voted
TVCG
2012
210views Hardware» more  TVCG 2012»
13 years 6 months ago
Scalable Multivariate Volume Visualization and Analysis Based on Dimension Projection and Parallel Coordinates
—In this paper, we present an effective and scalable system for multivariate volume data visualization and analysis with a novel transfer function interface design that tightly c...
Hanqi Guo, He Xiao, Xiaoru Yuan
DPHOTO
2009
138views Hardware» more  DPHOTO 2009»
15 years 1 months ago
Statistical identification and analysis of defect development in digital imagers
The lifetime of solid-state image sensors is limited by the appearance of defects, particularly hot-pixels, which we have previously shown to develop continuously over the sensor ...
Jenny Leung, Glenn H. Chapman, Zahava Koren, Israe...
121
Voted
WSC
2007
15 years 6 months ago
Mathematical programming-based perturbation analysis for GI/G/1 queues
This paper addresses several issues of using the mathematical programming representations of discrete-event dynamic systems in perturbation analysis. In particular, linear program...
He Zhang, Wai Kin Chan