Sciweavers

3907 search results - page 577 / 782
» Time, Knowledge, and Choice
Sort
View
CCS
2011
ACM
14 years 23 days ago
Policy auditing over incomplete logs: theory, implementation and applications
We present the design, implementation and evaluation of an algorithm that checks audit logs for compliance with privacy and security policies. The algorithm, which we name reduce,...
Deepak Garg, Limin Jia, Anupam Datta
113
Voted
INFOCOM
2012
IEEE
13 years 3 months ago
Robust multi-source network tomography using selective probes
—Knowledge of a network’s topology and internal characteristics such as delay times or losses is crucial to maintain seamless operation of network services. Network tomography ...
Akshay Krishnamurthy, Aarti Singh
KDD
2012
ACM
220views Data Mining» more  KDD 2012»
13 years 3 months ago
ComSoc: adaptive transfer of user behaviors over composite social network
Accurate prediction of user behaviors is important for many social media applications, including social marketing, personalization and recommendation, etc. A major challenge lies ...
ErHeng Zhong, Wei Fan, Junwei Wang, Lei Xiao, Yong...
110
Voted
CVPR
1999
IEEE
16 years 2 months ago
Deformable Template and Distribution Mixture-Based Data Modeling for the Endocardial Contour Tracking in an Echographic Sequence
We1 present a new method to shape-based segmentation of deformable anatomical structures in medical images and validate this approach by detecting and tracking the endocardial bor...
Max Mignotte, Jean Meunier
128
Voted
CVPR
2004
IEEE
16 years 2 months ago
Visual Odometry
We present a system that estimates the motion of a stereo head or a single moving camera based on video input. The system operates in real-time with low delay and the motion estim...
David Nistér, James R. Bergen, Oleg Narodit...