Sciweavers

14518 search results - page 2897 / 2904
» Two Problems for Sophistication
Sort
View
INFOCOM
2012
IEEE
13 years 6 days ago
Threshold compression for 3G scalable monitoring
—We study the problem of scalable monitoring of operational 3G wireless networks. Threshold-based performance monitoring in large 3G networks is very challenging for two main fac...
Suk-Bok Lee, Dan Pei, MohammadTaghi Hajiaghayi, Io...
ISSTA
2012
ACM
13 years 6 days ago
ViewPoints: differential string analysis for discovering client- and server-side input validation inconsistencies
Since web applications are easily accessible, and often store a large amount of sensitive user information, they are a common target for attackers. In particular, attacks that foc...
Muath Alkhalaf, Shauvik Roy Choudhary, Mattia Fazz...
KDD
2012
ACM
263views Data Mining» more  KDD 2012»
13 years 6 days ago
Integrating community matching and outlier detection for mining evolutionary community outliers
Temporal datasets, in which data evolves continuously, exist in a wide variety of applications, and identifying anomalous or outlying objects from temporal datasets is an importan...
Manish Gupta, Jing Gao, Yizhou Sun, Jiawei Han
SIGIR
2012
ACM
13 years 5 days ago
An uncertainty-aware query selection model for evaluation of IR systems
We propose a mathematical framework for query selection as a mechanism for reducing the cost of constructing information retrieval test collections. In particular, our mathematica...
Mehdi Hosseini, Ingemar J. Cox, Natasa Milic-Frayl...
CVPR
2012
IEEE
13 years 5 days ago
Supervised hashing with kernels
Recent years have witnessed the growing popularity of hashing in large-scale vision problems. It has been shown that the hashing quality could be boosted by leveraging supervised ...
Wei Liu, Jun Wang, Rongrong Ji, Yu-Gang Jiang, Shi...
« Prev « First page 2897 / 2904 Last » Next »