Sciweavers

5758 search results - page 1032 / 1152
» Anonymity-preserving data collection
Sort
View
IV
2008
IEEE
99views Visualization» more  IV 2008»
14 years 4 months ago
An Interview-Based User Study on the use of Visualizations for Folder Browsing
Hierarchically structured data collections often need to be visualized for the purposes of digital information management and presentation. File browsing, in particular, has an in...
Maria Golemati, Akrivi Katifori, Eugenia G. Gianno...
LCN
2008
IEEE
14 years 4 months ago
Modeling of multi-resolution active network measurement time-series
Abstract—Active measurements on network paths provide endto-end network health status in terms of metrics such as bandwidth, delay, jitter and loss. Hence, they are increasingly ...
Prasad Calyam, Ananth Devulapalli
NDSS
2008
IEEE
14 years 4 months ago
Analyzing Privacy in Enterprise Packet Trace Anonymization
Accurate network measurement through trace collection is critical for advancing network design and for maintaining secure, reliable networks. Unfortunately, the release of network...
Bruno F. Ribeiro, Weifeng Chen, Gerome Miklau, Don...
QEST
2008
IEEE
14 years 4 months ago
KPC-Toolbox: Simple Yet Effective Trace Fitting Using Markovian Arrival Processes
We present the KPC-Toolbox, a collection of Matlab scripts for fitting workload traces into Markovian Arrival Processes (MAPs) in an automatic way. We first present detailed sen...
Giuliano Casale, Eddy Z. Zhang, Evgenia Smirni
TOOLS
2008
IEEE
14 years 4 months ago
Towards Raising the Failure of Unit Tests to the Level of Compiler-Reported Errors
Running unit tests suites with contemporary tools such as JUNIT can show the presence of bugs, but not their locations. This is different from checking a program with a compiler, w...
Friedrich Steimann, Thomas Eichstädt-Engelen,...
« Prev « First page 1032 / 1152 Last » Next »