Sciweavers

883 search results - page 134 / 177
» Applying Sensitivity Analysis in Real-Time Distributed Syste...
Sort
View
INFOCOM
2006
IEEE
14 years 1 months ago
The Index Poisoning Attack in P2P File Sharing Systems
— P2P file-sharing systems have indexes, which users search to find locations of desired titles. In the index poisoning attack, the attacker inserts massive numbers of bogus re...
Jian Liang, Naoum Naoumov, Keith W. Ross
CDC
2010
IEEE
154views Control Systems» more  CDC 2010»
13 years 2 months ago
Concentration of measure inequalities for compressive Toeplitz matrices with applications to detection and system identification
In this paper, we derive concentration of measure inequalities for compressive Toeplitz matrices (having fewer rows than columns) with entries drawn from an independent and identic...
Borhan Molazem Sanandaji, Tyrone L. Vincent, Micha...
ICDE
2012
IEEE
267views Database» more  ICDE 2012»
11 years 10 months ago
Scalable and Numerically Stable Descriptive Statistics in SystemML
—With the exponential growth in the amount of data that is being generated in recent years, there is a pressing need for applying machine learning algorithms to large data sets. ...
Yuanyuan Tian, Shirish Tatikonda, Berthold Reinwal...
DAC
2008
ACM
14 years 8 months ago
Partial order reduction for scalable testing of systemC TLM designs
A SystemC simulation kernel consists of a deterministic implementation of the scheduler, whose specification is nondeterministic. To leverage testing of a SystemC TLM design, we f...
Sudipta Kundu, Malay K. Ganai, Rajesh Gupta
CIVR
2010
Springer
227views Image Analysis» more  CIVR 2010»
13 years 5 months ago
Evaluating detection of near duplicate video segments
The automatic detection of near duplicate video segments, such as multiple takes of a scene or different news video clips showing the same event, has received growing research int...
Werner Bailer