Sciweavers

23988 search results - page 4456 / 4798
» Social Network Computing
Sort
View
SIGCOMM
2004
ACM
15 years 10 months ago
Locating internet routing instabilities
This paper presents a methodology for identifying the autonomous system (or systems) responsible when a routing change is observed and propagated by BGP. The origin of such a rout...
Anja Feldmann, Olaf Maennel, Zhuoqing Morley Mao, ...
UIST
2004
ACM
15 years 10 months ago
SketchREAD: a multi-domain sketch recognition engine
We present SketchREAD, a multi-domain sketch recognition engine capable of recognizing freely hand-drawn diagrammatic sketches. Current computer sketch recognition systems are dif...
Christine Alvarado, Randall Davis
144
Voted
CCS
2004
ACM
15 years 10 months ago
Payload attribution via hierarchical bloom filters
Payload attribution is an important problem often encountered in network forensics. Given an excerpt of a payload, finding its source and destination is useful for many security ...
Kulesh Shanmugasundaram, Hervé Brönnim...
146
Voted
NOSSDAV
2004
Springer
15 years 10 months ago
Client-centered energy savings for concurrent HTTP connections
—In mobile devices, the wireless network interface card (WNIC) consumes a significant portion of overall system energy. One way to reduce energy consumed by a WNIC is to transit...
Haijin Yan, Rupa Krishnan, Scott A. Watterson, Dav...
CSB
2003
IEEE
130views Bioinformatics» more  CSB 2003»
15 years 10 months ago
Latent Structure Models for the Analysis of Gene Expression Data
Cluster methods have been successfully applied in gene expression data analysis to address tumor classification. By grouping tissue samples into homogeneous subsets, more systema...
Dong Hua, Dechang Chen, Xiuzhen Cheng, Abdou Youss...
« Prev « First page 4456 / 4798 Last » Next »