Sciweavers

219 search results - page 39 / 44
» Highly efficient techniques for network forensics
Sort
View
ALGORITHMICA
2006
139views more  ALGORITHMICA 2006»
14 years 11 months ago
CONQUEST: A Coarse-Grained Algorithm for Constructing Summaries of Distributed Discrete Datasets
Abstract. In this paper we present a coarse-grained parallel algorithm, CONQUEST, for constructing boundederror summaries of high-dimensional binary attributed data in a distribute...
Jie Chi, Mehmet Koyutürk, Ananth Grama

Publication
232views
14 years 10 months ago
Measurement in 802.11 Wireless Networks and its Applications
Ease of deployment, wireless connectivity and ubiquitous mobile on-the-go computing has made the IEEE 802.11 the most widely deployed Wireless Local Area Network (WLAN) sta...
Malik Ahmad Yar Khan
WWW
2004
ACM
16 years 11 days ago
An evaluation of binary XML encoding optimizations for fast stream based xml processing
This paper provides an objective evaluation of the performance impacts of binary XML encodings, using a fast stream-based XQuery processor as our representative application. Inste...
Roberto J. Bayardo Jr., Daniel Gruhl, Vanja Josifo...
VLDB
2007
ACM
96views Database» more  VLDB 2007»
15 years 5 months ago
Privacy Skyline: Privacy with Multidimensional Adversarial Knowledge
Privacy is an important issue in data publishing. Many organizations distribute non-aggregate personal data for research, and they must take steps to ensure that an adversary cann...
Bee-Chung Chen, Raghu Ramakrishnan, Kristen LeFevr...
ICCV
1999
IEEE
15 years 4 months ago
Learning Low-Level Vision
We describe a learning-based method for low-level vision problems--estimating scenes from images. We generate a synthetic world of scenes and their corresponding rendered images, m...
William T. Freeman, Egon C. Pasztor