Sciweavers

10820 search results - page 121 / 2164
» Understanding
Sort
View
78
Voted
GROUP
2009
ACM
15 years 9 months ago
Supporting transitions in work: informing large display application design by understanding whiteboard use
Anthony Tang, Joel Lanir, Saul Greenberg, Sidney F...
IMC
2009
ACM
15 years 9 months ago
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build ...
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Hua...
100
Voted
IMC
2009
ACM
15 years 9 months ago
Understanding slow BGP routing table transfers
Researchers and network operators often say that BGP table transfers are slow. Despite this common knowledge, the reasons for slow BGP transfers are not well understood. This pape...
Zied Ben-Houidi, Mickael Meulle, Renata Teixeira
102
Voted
IMC
2009
ACM
15 years 9 months ago
Understanding the efficacy of deployed internet source address validation filtering
Robert Beverly, Arthur Berger, Young Hyun, kc claf...
MM
2009
ACM
156views Multimedia» more  MM 2009»
15 years 9 months ago
Understanding near-duplicate videos: a user-centric approach
Popular content in video sharing web sites (e.g., YouTube) is usually duplicated. Most scholars define near-duplicate video clips (NDVC) based on non-semantic features (e.g., di...
Mauro Cherubini, Rodrigo de Oliveira, Nuria Oliver