Sciweavers

9316 search results - page 32 / 1864
» Analysis of traceback techniques
Sort
View
WPES
2003
ACM
14 years 1 months ago
Analysis of privacy preserving random perturbation techniques: further explorations
Privacy is becoming an increasingly important issue in many data mining applications, particularly in the security and defense area. This has triggered the development of many pri...
Haimonti Dutta, Hillol Kargupta, Souptik Datta, Kr...
WDAG
2007
Springer
63views Algorithms» more  WDAG 2007»
14 years 2 months ago
A Formal Analysis of the Deferred Update Technique
The deferred update technique is a widely used approach for building replicated database systems. Its fame stems from the fact that read-only transactions can execute locally to a...
Rodrigo Schmidt, Fernando Pedone
INFOCOM
2006
IEEE
14 years 2 months ago
Formal Analysis of Passive Measurement Inference Techniques
Abstract— Verifying the accuracy of a passive measurementsbased inference technique under all possible network scenarios is a difficult challenge - the measurement point has lim...
Sharad Jaiswal, Gianluca Iannaccone, James F. Kuro...
IV
2010
IEEE
172views Visualization» more  IV 2010»
13 years 6 months ago
An Application of Edge Bundling Techniques to the Visualization of Media Analysis Results
The advent of consumer-generated and social media has led to a continuous expansion and diversification of the media landscape. Media consumers frequently find themselves assuming ...
Wolfgang Kienreich, Christin Seifert
IPPS
2000
IEEE
14 years 26 days ago
Applying Interposition Techniques for Performance Analysis of OpenMP Parallel Applications
Tuning parallel applications requires the use of effective tools for detecting performance bottlenecks. Along a parallel program execution, many individual situations of performan...
Marc González, Albert Serra, Xavier Martore...