Sciweavers

1446 search results - page 284 / 290
» Local zero knowledge
Sort
View
TON
1998
103views more  TON 1998»
13 years 8 months ago
Using name-based mappings to increase hit rates
—Clusters of identical intermediate servers are often created to improve availability and robustness in many domains. The use of proxy servers for the World Wide Web (WWW) and of...
David Thaler, Chinya V. Ravishankar
SCFBM
2008
151views more  SCFBM 2008»
13 years 8 months ago
Wndchrm - an open source utility for biological image analysis
Background: Biological imaging is an emerging field, covering a wide range of applications in biological and clinical research. However, while machinery for automated experimentin...
Lior Shamir, Nikita Orlov, D. Mark Eckley, Tomasz ...
CIKM
2010
Springer
13 years 7 months ago
You are where you tweet: a content-based approach to geo-locating twitter users
We propose and evaluate a probabilistic framework for estimating a Twitter user’s city-level location based purely on the content of the user’s tweets, even in the absence of ...
Zhiyuan Cheng, James Caverlee, Kyumin Lee
IJCV
2010
194views more  IJCV 2010»
13 years 7 months ago
Extended Phase Field Higher-Order Active Contour Models for Networks - Its Application to Road Network Extraction from VHR Satel
This paper addresses the segmentation from an image of entities that have the form of a ‘network’, i.e. the region in the image corresponding to the entity is composed of bran...
Ting Peng, Ian H. Jermyn, Véronique Prinet,...
INFOCOM
2010
IEEE
13 years 7 months ago
From Time Domain to Space Domain: Detecting Replica Attacks in Mobile Ad Hoc Networks
—A common vulnerability of wireless networks, in particular, the mobile ad hoc network (MANET), is their susceptibility to node compromise/physical capture attacks since the wire...
Kai Xing, Xiuzhen Cheng