Sciweavers

6199 search results - page 1176 / 1240
» Monitoring the
Sort
View
GD
2008
Springer
15 years 29 days ago
Graph Drawing for Security Visualization
Abstract. As the number of devices connected to the internet continues to grow rapidly and software systems are being increasingly deployed on the web, security and privacy have be...
Roberto Tamassia, Bernardo Palazzi, Charalampos Pa...

Publication
323views
15 years 29 days ago
Reconstruction of snow and ice surfaces using multiple view  vision techniques
In this paper we describe a vision system for reconstructing the relative structure of snow and ice surfaces. This effort is one step toward the long-term goal of rendering absol...
GOWRI SOMANATH , ROHITH MV , CATHLEEN A. GEIGER ...
DASFAA
2010
IEEE
225views Database» more  DASFAA 2010»
15 years 2 days ago
Mining Regular Patterns in Data Streams
Discovering interesting patterns from high-speed data streams is a challenging problem in data mining. Recently, the support metric-based frequent pattern mining from data stream h...
Syed Khairuzzaman Tanbeer, Chowdhury Farhan Ahmed,...
MOBICOM
2010
ACM
15 years 2 days ago
Differential forms for target tracking and aggregate queries in distributed networks
Consider mobile targets moving in a plane and their movements being monitored by a network such as a field of sensors. We develop distributed algorithms for in-network tracking an...
Rik Sarkar, Jie Gao
SIGCOMM
2010
ACM
15 years 2 days ago
Circumventing censorship with collage
Oppressive regimes and even democratic governments restrict Internet access. Existing anti-censorship systems often require users to connect through proxies, but these systems are...
Sam Burnett, Nick Feamster, Santosh Vempala
« Prev « First page 1176 / 1240 Last » Next »