Sciweavers

2304 search results - page 388 / 461
» On the Vulnerability of Large Graphs
Sort
View
ISCA
1992
IEEE
113views Hardware» more  ISCA 1992»
14 years 2 months ago
Dynamic Dependency Analysis of Ordinary Programs
A quantitative analysis of program execution is essential to the computer architecture design process. With the current trend in architecture of enhancing the performance of unipr...
Todd M. Austin, Gurindar S. Sohi
CVPR
2007
IEEE
14 years 2 months ago
Inferring 3D Volumetric Shape of Both Moving Objects and Static Background Observed by a Moving Camera
We present a novel approach to inferring 3D volumetric shape of both moving objects and static background from video sequences shot by a moving camera, with the assumption that th...
Chang Yuan, Gérard G. Medioni
KDD
2010
ACM
214views Data Mining» more  KDD 2010»
14 years 2 months ago
Neighbor query friendly compression of social networks
Compressing social networks can substantially facilitate mining and advanced analysis of large social networks. Preferably, social networks should be compressed in a way that they...
Hossein Maserrat, Jian Pei
AIRWEB
2006
Springer
14 years 2 months ago
Web Spam Detection with Anti-Trust Rank
Spam pages on the web use various techniques to artificially achieve high rankings in search engine results. Human experts can do a good job of identifying spam pages and pages wh...
Vijay Krishnan, Rashmi Raj
FCCM
2004
IEEE
133views VLSI» more  FCCM 2004»
14 years 2 months ago
A Methodology for Synthesis of Efficient Intrusion Detection Systems on FPGAs
Intrusion detection for network security is a computation intensive application demanding high system performance. System level design, a relatively unexplored field in this area,...
Zachary K. Baker, Viktor K. Prasanna