Sciweavers

1534 search results - page 133 / 307
» Application of data warehouse technology in power analysis
Sort
View
ICDM
2006
IEEE
158views Data Mining» more  ICDM 2006»
15 years 4 months ago
Detection of Interdomain Routing Anomalies Based on Higher-Order Path Analysis
Internet routing dynamics have been extensively studied in the past few years. However, dynamics such as interdomain Border Gateway Protocol (BGP) behavior are still poorly unders...
Murat Can Ganiz, Sudhan Kanitkar, Mooi Choo Chuah,...
SPIRE
2010
Springer
14 years 8 months ago
Fingerprinting Ratings for Collaborative Filtering - Theoretical and Empirical Analysis
Abstract. We consider fingerprinting methods for collaborative filtering (CF) systems. In general, CF systems show their real strength when supplied with enormous data sets. Earl...
Yoram Bachrach, Ralf Herbrich
IEEECIT
2010
IEEE
14 years 8 months ago
Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds
—Phishing is the practice of eliciting a person’s confidential information such as the name, date of birth or credit card details. Typically, the phishers combine some technol...
Federico Maggi
IEAAIE
2010
Springer
14 years 8 months ago
Driver's Behavior Assessment by On-board/Off-board Video Context Analysis
In the last few years, the application of ICT technologies in automotive field has taken an increasing role in improving both the safety and the driving comfort. In this context, s...
Lorenzo Ciardelli, Andrea Beoldo, Francesco Pasini...
82
Voted
VLSID
2004
IEEE
107views VLSI» more  VLSID 2004»
15 years 10 months ago
Performance Analysis of Inter Cluster Communication Methods in VLIW Architecture
With increasing demands for high performance by embedded systems, especially by digital signal processing applications, embedded processors must increase available instruction lev...
Sourabh Saluja, Anshul Kumar