Sciweavers

11182 search results - page 1975 / 2237
» Shape Analysis of Sets
Sort
View
NSPW
2006
ACM
15 years 10 months ago
Large-scale collection and sanitization of network security data: risks and challenges
Over the last several years, there has been an emerging interest in the development of widearea data collection and analysis centers to help identify, track, and formulate respons...
Phillip A. Porras, Vitaly Shmatikov
SAC
2006
ACM
15 years 10 months ago
Mining and analyzing the topological structure of protein-protein interaction networks
We report a comprehensive evaluation of the topological structure of protein-protein interaction (PPI) networks by mining and analyzing graphs constructed from the publicly availa...
Daniel Duanqing Wu, Xiaohua Hu
SIGCOMM
2006
ACM
15 years 10 months ago
Quantifying Skype user satisfaction
The success of Skype has inspired a generation of peer-topeer-based solutions for satisfactory real-time multimedia services over the Internet. However, fundamental questions, suc...
Kuan-Ta Chen, Chun-Ying Huang, Polly Huang, Chin-L...
SOUPS
2006
ACM
15 years 10 months ago
A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords
Previous research has found graphical passwords to be more memorable than non-dictionary or “strong” alphanumeric passwords. Participants in a prior study expressed concerns t...
Furkan Tari, A. Ant Ozok, Stephen H. Holden
CEC
2005
IEEE
15 years 10 months ago
Multiobjective clustering around medoids
Abstract- The large majority of existing clustering algorithms are centered around the notion of a feature, that is, individual data items are represented by their intrinsic proper...
Julia Handl, Joshua D. Knowles
« Prev « First page 1975 / 2237 Last » Next »