Sciweavers

227 search results - page 31 / 46
» Identifying and Generating Easy Sets of Constraints for Clus...
Sort
View
TOG
2010
64views more  TOG 2010»
14 years 4 months ago
K-set tilable surfaces
This paper introduces a method for optimizing the tiles of a quadmesh. Given a quad-based surface, the goal is to generate a set of K quads whose instances can produce a tiled sur...
Chi-Wing Fu, Chi-Fu Lai, Ying He 0001, Daniel Cohe...
POLICY
2007
Springer
15 years 3 months ago
Distributed Enforcement of Unlinkability Policies: Looking Beyond the Chinese Wall
We present a discretionary access control framework that can be used to control a principal’s ability to link information from two or more audit records and compromise a user’...
Apu Kapadia, Prasad Naldurg, Roy H. Campbell
SMI
2006
IEEE
183views Image Analysis» more  SMI 2006»
15 years 3 months ago
The Generalized Shape Distributions for Shape Matching and Analysis
This paper presents a novel 3D shape descriptor "The Generalized Shape Distributions" for effective shape matching and analysis, by taking advantage of both local and gl...
Yi Liu, Hongbin Zha, Hong Qin
ISMIS
2005
Springer
15 years 3 months ago
Learning the Daily Model of Network Traffic
Abstract. Anomaly detection is based on profiles that represent normal behaviour of users, hosts or networks and detects attacks as significant deviations from these profiles. In t...
Costantina Caruso, Donato Malerba, Davide Papagni
JSSPP
2009
Springer
15 years 4 months ago
Scalability Analysis of Job Scheduling Using Virtual Nodes
It is important to identify scalability constraints in existing job scheduling software as they are applied to next generation parallel systems. In this paper, we analyze the scala...
Norman Bobroff, Richard Coppinger, Liana Fong, See...