Sciweavers

2004 search results - page 277 / 401
» Sampling from large graphs
Sort
View
132
Voted
PICS
2001
15 years 3 months ago
Dot Placement Analysis Using a Line Scan Camera and Rigid Body Rotation
Printer manufacturers design print heads and halftone patterns to result in specific types of image characteristics. Many image quality artifacts are a result of differences in ac...
Yair Kipman, Kate Johnson
154
Voted
CRYPTO
2010
Springer
201views Cryptology» more  CRYPTO 2010»
15 years 3 months ago
Protecting Cryptographic Keys against Continual Leakage
Side-channel attacks have often proven to have a devastating effect on the security of cryptographic schemes. In this paper, we address the problem of storing cryptographic keys a...
Ali Juma, Yevgeniy Vahlis
CSDA
2010
157views more  CSDA 2010»
15 years 2 months ago
Robust estimation of constrained covariance matrices for confirmatory factor analysis
Confirmatory factor analysis (CFA) is a data anylsis procedure that is widely used in social and behavioral sciences in general and other applied sciences that deal with large qua...
E. Dupuis Lozeron, M. P. Victoria-Feser
106
Voted
TON
2002
99views more  TON 2002»
15 years 2 months ago
Beyond folklore: observations on fragmented traffic
Fragmented IP traffic is a poorly understood component of the overall mix of traffic on the Internet. Many assertions about the nature and extent of fragmented traffic are anecdota...
Colleen Shannon, David Moore, Kimberly C. Claffy
258
Voted
ICDE
2009
IEEE
214views Database» more  ICDE 2009»
16 years 4 months ago
Ranking with Uncertain Scores
Large databases with uncertain information are becoming more common in many applications including data integration, location tracking, and Web search. In these applications, ranki...
Mohamed A. Soliman, Ihab F. Ilyas