Sciweavers

775 search results - page 109 / 155
» Email data cleaning
Sort
View
INTR
2007
81views more  INTR 2007»
14 years 9 months ago
Network externality and future usage of Internet services
Purpose – The purpose of this paper is to investigate different effects of three network externality factors, i.e. local network size, network strength, and total network size, ...
Sung Yong Chun, Minhi Hahn
CCR
2010
139views more  CCR 2010»
14 years 9 months ago
Longitudinal study of BGP monitor session failures
BGP routing data collected by RouteViews and RIPE RIS have become an essential asset to both the network research and operation communities. However, it has long been speculated t...
Pei-chun Cheng, Xin Zhao, Beichuan Zhang, Lixia Zh...
CVPR
2008
IEEE
15 years 11 months ago
Randomized trees for human pose detection
This paper addresses human pose recognition from video sequences by formulating it as a classification problem. Unlike much previous work we do not make any assumptions on the ava...
Grégory Rogez, Jonathan Rihan, Srikumar Ram...
CHI
2004
ACM
15 years 10 months ago
Variation in element and action: supporting simultaneous development of alternative solutions
The complexity of many problems necessitates creating and exploring multiple, alternative solutions. However, current user interfaces do not cleanly support creating alternatives ...
Michael A. Terry, Elizabeth D. Mynatt, Kumiyo Naka...
SOSP
2009
ACM
15 years 6 months ago
Fabric: a platform for secure distributed computation and storage
Fabric is a new system and language for building secure distributed information systems. It is a decentralized system that allows heterogeneous network nodes to securely share bot...
Jed Liu, Michael D. George, K. Vikram, Xin Qi, Luc...