Sciweavers

7961 search results - page 1270 / 1593
» Input-Output Model Programs
Sort
View
ICDE
2010
IEEE
260views Database» more  ICDE 2010»
16 years 4 months ago
Anonymizing Weighted Social Network Graphs
The increasing popularity of social networks has initiated a fertile research area in information extraction and data mining. Although such analysis can facilitate better understan...
Sudipto Das, Ömer Egecioglu, Amr El Abbadi
PERCOM
2007
ACM
16 years 4 months ago
Expressing Sensor Network Interaction Patterns Using Data-Driven Macroprogramming
Wireless Sensor Networks (WSNs) are increasingly being employed as a key building block of pervasive computing infrastructures, owing to their ability to be embedded within the re...
Animesh Pathak, Luca Mottola, Amol Bakshi, Viktor ...
EUROGRAPHICS
2010
Eurographics
16 years 1 months ago
Rendering Wave Effects with Augmented Light Field
Ray–based representations can model complex light transport but are limited in modeling diffraction effects that require the simulation of wavefront propagation. This paper prov...
Se Baek Oh, Sriram Kashyap, Rohit Garg, Sharat Cha...
CVPR
2010
IEEE
16 years 19 days ago
Energy Minimization for Linear Envelope MRFs
Markov random fields with higher order potentials have emerged as a powerful model for several problems in computer vision. In order to facilitate their use, we propose a new rep...
Pushmeet Kohli, M. Pawan Kumar
HICSS
2009
IEEE
98views Biometrics» more  HICSS 2009»
15 years 11 months ago
Replicating and Sharing Computer Security Laboratory Environments
Many institutions are currently investigating the feasibility of creating Computer Security Laboratory environments for their researchers and students. This paper compares four of...
Kara L. Nance, Brian Hay, Ronald Dodge, James Wrub...
« Prev « First page 1270 / 1593 Last » Next »