Sciweavers

1625 search results - page 219 / 325
» Privacy-preserving data publishing
Sort
View
KDD
2006
ACM
156views Data Mining» more  KDD 2006»
16 years 5 months ago
Detecting outliers using transduction and statistical testing
Outlier detection can uncover malicious behavior in fields like intrusion detection and fraud analysis. Although there has been a significant amount of work in outlier detection, ...
Daniel Barbará, Carlotta Domeniconi, James ...
IMC
2005
ACM
15 years 10 months ago
Network Anomography
Anomaly detection is a first and important step needed to respond to unexpected problems and to assure high performance and security in IP networks. We introduce a framework and ...
Yin Zhang, Zihui Ge, Albert G. Greenberg, Matthew ...
ICS
2001
Tsinghua U.
15 years 9 months ago
Cache performance for multimedia applications
The caching behavior of multimedia applications has been described as having high instruction reference locality within small loops, very large working sets, and poor data cache p...
Nathan T. Slingerland, Alan Jay Smith
SIGGRAPH
1994
ACM
15 years 8 months ago
Fast volume rendering using a shear-warp factorization of the viewing transformation
Several existing volume rendering algorithms operate by factoring the viewing transformation into a 3D shear parallel to the data slices, a projection to form an intermediate but ...
Philippe Lacroute, Marc Levoy
KYOTODL
2000
122views more  KYOTODL 2000»
15 years 6 months ago
Federation Services for Heterogeneous Digital Libraries Accessing Cooperative and Non-Cooperative Sources
Today, bibliographical information is kept in a variety of digital libraries available on the Internet. The integration of bibliographical data is considered as one of the most im...
Martin Endig, Michael Höding, Gunter Saake, K...