Sciweavers

3104 search results - page 442 / 621
» Using quantitative analysis to implement autonomic IT system...
Sort
View
ISCAPDCS
2004
15 years 6 months ago
Detecting Grid-Abuse Attacks by Source-based Monitoring
While it provides the unprecedented processing power to solve many large scale computational problems, GRID, if abused, has the potential to easily be used to launch (for instance...
Jianjia Wu, Dan Cheng, Wei Zhao
BMCBI
2004
117views more  BMCBI 2004»
15 years 4 months ago
Cancer characterization and feature set extraction by discriminative margin clustering
Background: A central challenge in the molecular diagnosis and treatment of cancer is to define a set of molecular features that, taken together, distinguish a given cancer, or ty...
Kamesh Munagala, Robert Tibshirani, Patrick O. Bro...
CHI
2002
ACM
16 years 5 months ago
NetRaker suite: a demonstration
This demonstration will show the application of a unique approach to collecting and analyzing usability data from the users of Web sites and software applications. The NetRaker Su...
Doug van Duyne, James A. Landay, Matthew Tarpy
DASFAA
2009
IEEE
252views Database» more  DASFAA 2009»
15 years 11 months ago
Optimal Privacy-Aware Path in Hippocratic Databases
Abstract. Privacy becomes a major concern for both customers and enterprises in today’s corporate marketing strategies, many research efforts have been put into developing new p...
Min Li, Xiaoxun Sun, Hua Wang, Yanchun Zhang
155
Voted
SIGGRAPH
2000
ACM
15 years 9 months ago
Plenoptic sampling
This paper studies the problem of plenoptic sampling in imagebased rendering (IBR). From a spectral analysis of light field signals and using the sampling theorem, we mathematica...
Jinxiang Chai, Shing-Chow Chan, Heung-Yeung Shum, ...