Sciweavers

762 search results - page 115 / 153
» Finding SHA-1 Characteristics: General Results and Applicati...
Sort
View
ICSE
2010
IEEE-ACM
13 years 10 months ago
An exploratory study of fault-proneness in evolving aspect-oriented programs
This paper presents the results of an exploratory study on the fault-proneness of aspect-oriented programs. We analysed the faults collected from three evolving aspect-oriented sy...
Fabiano Cutigi Ferrari, Rachel Burrows, Otá...
KDD
2009
ACM
133views Data Mining» more  KDD 2009»
14 years 9 months ago
On the tradeoff between privacy and utility in data publishing
In data publishing, anonymization techniques such as generalization and bucketization have been designed to provide privacy protection. In the meanwhile, they reduce the utility o...
Tiancheng Li, Ninghui Li
CIVR
2009
Springer
212views Image Analysis» more  CIVR 2009»
14 years 3 months ago
NUS-WIDE: a real-world web image database from National University of Singapore
This paper introduces a web image dataset created by NUS’s Lab for Media Search. The dataset includes: (1) 269,648 images and the associated tags from Flickr, with a total of 5,...
Tat-Seng Chua, Jinhui Tang, Richang Hong, Haojie L...
CORR
2008
Springer
152views Education» more  CORR 2008»
13 years 8 months ago
Characterizing User Mobility in Second Life
In this work we present a measurement study of user mobility in Second Life. We first discuss different techniques to collect user traces and then focus on results obtained using ...
Chi-Anh La, Pietro Michiardi
CCR
2006
122views more  CCR 2006»
13 years 8 months ago
Low complexity, stable scheduling algorithms for networks of input queued switches with no or very low speed-up
The delay and throughput characteristics of a packet switch depend mainly on the queueing scheme and the scheduling algorithm deployed at the switch. Early research on scheduling ...
Claus Bauer