Sciweavers

897 search results - page 101 / 180
» Identity: How to name it, How to find it
Sort
View
SIGCOMM
1996
ACM
15 years 5 months ago
On the Relevance of Long-Range Dependence in Network Traffic
There is much experimental evidence that network traffic processes exhibit ubiquitous properties of self-similarity and long-range dependence, i.e., of correlations over a wide ran...
Matthias Grossglauser, Jean-Chrysostome Bolot
JSS
2000
85views more  JSS 2000»
15 years 1 months ago
An experimental comparison of reading techniques for defect detection in UML design documents
The basic motivation for software inspections is to detect and remove defects before they propagate to subsequent development phases where their detection and removal becomes more...
Oliver Laitenberger, Colin Atkinson, Maud Schlich,...
SIAMSC
2008
140views more  SIAMSC 2008»
15 years 1 months ago
Compact Fourier Analysis for Designing Multigrid Methods
The convergence of Multigrid methods can be analyzed based on a Fourier analysis of the method or by proving certain inequalities that have to be fulfilled by the smoother and by t...
Thomas K. Huckle
PAMI
2002
122views more  PAMI 2002»
15 years 1 months ago
Analytic PCA Construction for Theoretical Analysis of Lighting Variability in Images of a Lambertian Object
We analyze theoretically the subspace best approximating images of a convex Lambertian object taken from the same viewpoint, but under different distant illumination conditions. Si...
Ravi Ramamoorthi
ACSAC
2010
IEEE
14 years 11 months ago
Detecting spammers on social networks
Social networking has become a popular way for users to meet and interact online. Users spend a significant amount of time on popular social network platforms (such as Facebook, M...
Gianluca Stringhini, Christopher Kruegel, Giovanni...