Sciweavers

670 search results - page 99 / 134
» An Immunological Approach to Change Detection: Theoretical R...
Sort
View
COSIT
2009
Springer
134views GIS» more  COSIT 2009»
14 years 2 months ago
Evaluating the Effectiveness and Efficiency of Visual Variables for Geographic Information Visualization
We propose an empirical, perception-based evaluation approach for assessing the effectiveness and efficiency of longstanding cartographic design principles applied to 2D map displa...
Simone Garlandini, Sara Irina Fabrikant
INFOCOM
2012
IEEE
11 years 10 months ago
SybilDefender: Defend against sybil attacks in large social networks
—Distributed systems without trusted identities are particularly vulnerable to sybil attacks, where an adversary creates multiple bogus identities to compromise the running of th...
Wei Wei, Fengyuan Xu, Chiu Chiang Tan, Qun Li
ICASSP
2011
IEEE
12 years 11 months ago
Steady-state analysis of the NLMS algorithm with reusing coefficient vector and a method for improving its performance
The reuse of past coefficient vectors of the NLMS for reducing the steady-state MSD in a low signal-to-noise ratio (SNR) was proposed recently. Its convergence analysis has not b...
Seong-Eun Kim, Jae-Woo Lee, Woo-Jin Song
BMCBI
2010
141views more  BMCBI 2010»
13 years 7 months ago
BioPhysConnectoR: Connecting Sequence Information and Biophysical Models
Background: One of the most challenging aspects of biomolecular systems is the understanding of the coevolution in and among the molecule(s). A complete, theoretical picture of th...
Franziska Hoffgaard, Philipp Weil, Kay Hamacher
SIGCOMM
2006
ACM
14 years 1 months ago
Beyond bloom filters: from approximate membership checks to approximate state machines
Many networking applications require fast state lookups in a concurrent state machine, which tracks the state of a large number of flows simultaneously. We consider the question ...
Flavio Bonomi, Michael Mitzenmacher, Rina Panigrah...