Sciweavers

7544 search results - page 1325 / 1509
» Network Forensics Analysis
Sort
View
CHI
2005
ACM
16 years 5 months ago
Six themes of the communicative appropriation of photographic images
In this paper, we explore the use of digital photographs in computer-mediated communication. We present Lascaux, an instant messaging client that serves as a research platform for...
Amy Voida, Elizabeth D. Mynatt
HPCA
2003
IEEE
16 years 5 months ago
Evaluating the Impact of Communication Architecture on the Performability of Cluster-Based Services
We consider the impact of different communication architectures on the performability (performance + availability) of cluster-based servers. In particular, we use a combination of ...
Kiran Nagaraja, Neeraj Krishnan, Ricardo Bianchini...
CHI
2004
ACM
16 years 5 months ago
A commonsense approach to predictive text entry
People cannot type as fast as they think, especially when faced with the constraints of mobile devices. There have been numerous approaches to solving this problem, including rese...
Tom Stocky, Alexander Faaborg, Henry Lieberman
VLDB
2005
ACM
153views Database» more  VLDB 2005»
16 years 4 months ago
An effective and efficient algorithm for high-dimensional outlier detection
Abstract. The outlier detection problem has important applications in the field of fraud detection, network robustness analysis, and intrusion detection. Most such applications are...
Charu C. Aggarwal, Philip S. Yu
VLDB
2009
ACM
165views Database» more  VLDB 2009»
16 years 4 months ago
Online pairing of VoIP conversations
This paper answers the following question; given a multiplicity of evolving 1-way conversations, can a machine or an algorithm discern the conversational pairs in an online fashio...
Michail Vlachos, Aris Anagnostopoulos, Olivier Ver...
« Prev « First page 1325 / 1509 Last » Next »