Sciweavers

6042 search results - page 1148 / 1209
» Repeated Observation Models
Sort
View
WWW
2010
ACM
14 years 5 months ago
Earthquake shakes Twitter users: real-time event detection by social sensors
Twitter, a popular microblogging service, has received much attention recently. An important characteristic of Twitter is its real-time nature. For example, when an earthquake occ...
Takeshi Sakaki, Makoto Okazaki, Yutaka Matsuo
WISEC
2010
ACM
14 years 5 months ago
pBMDS: a behavior-based malware detection system for cellphone devices
Computing environments on cellphones, especially smartphones, are becoming more open and general-purpose, thus they also become attractive targets of malware. Cellphone malware no...
Liang Xie, Xinwen Zhang, Jean-Pierre Seifert, Senc...
SI3D
2010
ACM
14 years 4 months ago
Interactive volume caustics in single-scattering media
Volume caustics are intricate illumination patterns formed by light first interacting with a specular surface and subsequently being scattered inside a participating medium. Alth...
Wei Hu, Zhao Dong, Ivo Ihrke, Thorsten Grosch, Guo...
PAM
2010
Springer
14 years 4 months ago
Toward Topology Dualism: Improving the Accuracy of AS Annotations for Routers
Abstract. To describe, analyze, and model the topological and structural characteristics of the Internet, researchers use Internet maps constructed at the router or autonomous syst...
Bradley Huffaker, Amogh Dhamdhere, Marina Fomenkov...
PLDI
2009
ACM
14 years 4 months ago
A weakest precondition approach to active attacks analysis
Information flow controls can be used to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted envi...
Musard Balliu, Isabella Mastroeni
« Prev « First page 1148 / 1209 Last » Next »