Sciweavers

852 search results - page 81 / 171
» Building a better NetFlow
Sort
View
KDD
2004
ACM
113views Data Mining» more  KDD 2004»
15 years 10 months ago
Learning spatially variant dissimilarity (SVaD) measures
Clustering algorithms typically operate on a feature vector representation of the data and find clusters that are compact with respect to an assumed (dis)similarity measure betwee...
Krishna Kummamuru, Raghu Krishnapuram, Rakesh Agra...
CHI
2008
ACM
15 years 10 months ago
Undercover: authentication usable in front of prying eyes
A number of recent scams and security attacks (phishing, spyware, fake terminals, ...) hinge on a crook's ability to observe user behavior. In this paper, we describe the des...
Hirokazu Sasamoto, Nicolas Christin, Eiji Hayashi
CHI
2007
ACM
15 years 10 months ago
Understanding and developing models for detecting and differentiating breakpoints during interactive tasks
The ability to detect and differentiate breakpoints during task execution is critical for enabling defer-to-breakpoint policies within interruption management. In this work, we ex...
Shamsi T. Iqbal, Brian P. Bailey
CHI
2006
ACM
15 years 10 months ago
A fisheye follow-up: further reflections on focus + context
Information worlds continue to grow, posing daunting challenges for interfaces. This paper tries to increase our understanding of approaches to the problem, building on the Genera...
George W. Furnas
EDBT
2008
ACM
160views Database» more  EDBT 2008»
15 years 10 months ago
Why go logarithmic if we can go linear?: Towards effective distinct counting of search traffic
Estimating the number of distinct elements in a large multiset has several applications, and hence has attracted active research in the past two decades. Several sampling and sket...
Ahmed Metwally, Divyakant Agrawal, Amr El Abbadi