Sciweavers

686 search results - page 124 / 138
» Statistical Timing Analysis with Extended Pseudo-Canonical T...
Sort
View
NDSS
2009
IEEE
14 years 3 months ago
RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows
Linking network flows is an important problem in intrusion detection as well as anonymity. Passive traffic analysis can link flows but requires long periods of observation to r...
Amir Houmansadr, Negar Kiyavash, Nikita Borisov
WSDM
2009
ACM
187views Data Mining» more  WSDM 2009»
14 years 3 months ago
Speeding up algorithms on compressed web graphs
A variety of lossless compression schemes have been proposed to reduce the storage requirements of web graphs. One successful approach is virtual node compression [7], in which of...
Chinmay Karande, Kumar Chellapilla, Reid Andersen
CORR
2006
Springer
102views Education» more  CORR 2006»
13 years 8 months ago
Theoretical Properties of Projection Based Multilayer Perceptrons with Functional Inputs
Many real world data are sampled functions. As shown by Functional Data Analysis (FDA) methods, spectra, time series, images, gesture recognition data, etc. can be processed more e...
Fabrice Rossi, Brieuc Conan-Guez
FAST
2007
13 years 10 months ago
Failure Trends in a Large Disk Drive Population
It is estimated that over 90% of all new information produced in the world is being stored on magnetic media, most of it on hard disk drives. Despite their importance, there is re...
Eduardo Pinheiro, Wolf-Dietrich Weber, Luiz Andr&e...
ATAL
2010
Springer
13 years 9 months ago
Planning against fictitious players in repeated normal form games
Planning how to interact against bounded memory and unbounded memory learning opponents needs different treatment. Thus far, however, work in this area has shown how to design pla...
Enrique Munoz de Cote, Nicholas R. Jennings