Sciweavers

47 search results - page 4 / 10
» Sources of evidence for vertical selection
Sort
View
BROADNETS
2007
IEEE
15 years 4 months ago
Strategic deployment of network monitors for attack attribution
—Attacks launched over the Internet have become a pressing problem. Attackers make use of a variety of techniques to anonymize their traffic, in order to escape detection and pr...
Young June Pyun, Douglas S. Reeves
WSCG
2004
205views more  WSCG 2004»
14 years 11 months ago
Visualisation System Based on Image Warping and Delaunay Triangulation of the Space
In this article we present a visualisation algorithm based on image warping. A source data for the algorithm is a set of images with colour and depth information rendered for the ...
Przemyslaw Kozankiewicz
DAM
2008
108views more  DAM 2008»
14 years 10 months ago
On the complexity of the multicut problem in bounded tree-width graphs and digraphs
Given an edge- or vertex-weighted graph or digraph and a list of source-sink pairs, the minimum multicut problem consists in selecting a minimum weight set of edges or vertices wh...
Cédric Bentz
IJBC
2007
72views more  IJBC 2007»
14 years 10 months ago
Centrality Estimation in Large Networks
Centrality indices are an essential concept in network analysis. For those based on shortest-path distances the computation is at least quadratic in the number of nodes, since it ...
Ulrik Brandes, Christian Pich
ICDE
2008
IEEE
127views Database» more  ICDE 2008»
15 years 11 months ago
Querying Data under Access Limitations
Data sources on the web are often accessible through web interfaces that present them as relational tables, but require certain attributes to be mandatorily selected, e.g., via a w...
Andrea Calì, Davide Martinenghi