Sciweavers

219 search results - page 39 / 44
» Highly efficient techniques for network forensics
Sort
View
ALGORITHMICA
2006
139views more  ALGORITHMICA 2006»
13 years 7 months ago
CONQUEST: A Coarse-Grained Algorithm for Constructing Summaries of Distributed Discrete Datasets
Abstract. In this paper we present a coarse-grained parallel algorithm, CONQUEST, for constructing boundederror summaries of high-dimensional binary attributed data in a distribute...
Jie Chi, Mehmet Koyutürk, Ananth Grama

Publication
232views
13 years 5 months ago
Measurement in 802.11 Wireless Networks and its Applications
Ease of deployment, wireless connectivity and ubiquitous mobile on-the-go computing has made the IEEE 802.11 the most widely deployed Wireless Local Area Network (WLAN) sta...
Malik Ahmad Yar Khan
WWW
2004
ACM
14 years 8 months ago
An evaluation of binary XML encoding optimizations for fast stream based xml processing
This paper provides an objective evaluation of the performance impacts of binary XML encodings, using a fast stream-based XQuery processor as our representative application. Inste...
Roberto J. Bayardo Jr., Daniel Gruhl, Vanja Josifo...
VLDB
2007
ACM
96views Database» more  VLDB 2007»
14 years 1 months ago
Privacy Skyline: Privacy with Multidimensional Adversarial Knowledge
Privacy is an important issue in data publishing. Many organizations distribute non-aggregate personal data for research, and they must take steps to ensure that an adversary cann...
Bee-Chung Chen, Raghu Ramakrishnan, Kristen LeFevr...
ICCV
1999
IEEE
13 years 11 months ago
Learning Low-Level Vision
We describe a learning-based method for low-level vision problems--estimating scenes from images. We generate a synthetic world of scenes and their corresponding rendered images, m...
William T. Freeman, Egon C. Pasztor