Sciweavers

16822 search results - page 3361 / 3365
» Designing Simulation Experiments
Sort
View
TON
2012
13 years 14 days ago
A New Cell-Counting-Based Attack Against Tor
Abstract—Various low-latency anonymous communication systems such as Tor and Anonymizer have been designed to provide anonymity service for users. In order to hide the communicat...
Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Dong Xu...
CVPR
2012
IEEE
13 years 14 days ago
Spherical hashing
Many binary code encoding schemes based on hashing have been actively studied recently, since they can provide efficient similarity search, especially nearest neighbor search, an...
Jae-Pil Heo, Youngwoon Lee, Junfeng He, Shih-Fu Ch...
CVPR
2012
IEEE
13 years 14 days ago
Center-Shift: An approach towards automatic robust mesh segmentation (ARMS)
In the area of 3D shape analysis, research in mesh segmentation has always been an important topic, as it is a fundamental low-level task which can be utilized in many application...
Mengtian Sun, Yi Fang, Karthik Ramani
TVCG
2012
210views Hardware» more  TVCG 2012»
13 years 14 days ago
Scalable Multivariate Volume Visualization and Analysis Based on Dimension Projection and Parallel Coordinates
—In this paper, we present an effective and scalable system for multivariate volume data visualization and analysis with a novel transfer function interface design that tightly c...
Hanqi Guo, He Xiao, Xiaoru Yuan
SDM
2012
SIAM
340views Data Mining» more  SDM 2012»
13 years 13 days ago
IntruMine: Mining Intruders in Untrustworthy Data of Cyber-physical Systems
A Cyber-Physical System (CPS) integrates physical (i.e., sensor) devices with cyber (i.e., informational) components to form a situation-aware system that responds intelligently t...
Lu An Tang, Quanquan Gu, Xiao Yu, Jiawei Han, Thom...
« Prev « First page 3361 / 3365 Last » Next »