Sciweavers

5829 search results - page 1043 / 1166
» The Practice of Cluster Analysis
Sort
View
ACNS
2011
Springer
237views Cryptology» more  ACNS 2011»
13 years 1 months ago
Private Discovery of Common Social Contacts
The increasing use of computing devices for social interactions propels the proliferation of online social applications, yet, it prompts a number of privacy concerns. One common p...
Emiliano De Cristofaro, Mark Manulis, Bertram Poet...
ACNS
2011
Springer
244views Cryptology» more  ACNS 2011»
13 years 1 months ago
Quantitatively Analyzing Stealthy Communication Channels
Abstract. Attackers in particular botnet controllers use stealthy messaging systems to set up large-scale command and control. Understanding the capacity of such communication chan...
Patrick Butler, Kui Xu, Danfeng (Daphne) Yao
ASPLOS
2011
ACM
13 years 1 months ago
Improving software diagnosability via log enhancement
Diagnosing software failures in the field is notoriously difficult, in part due to the fundamental complexity of trouble-shooting any complex software system, but further exacer...
Ding Yuan, Jing Zheng, Soyeon Park, Yuanyuan Zhou,...
CHI
2011
ACM
13 years 1 months ago
Evaluating video visualizations of human behavior
Previously, we presented Viz-A-Vis, a VIsualiZation of Activity through computer VISion [17]. Viz-A-Vis visualizes behavior as aggregate motion over observation space. In this pap...
Mario Romero, Alice Vialard, John Peponis, John T....
HCI
2011
13 years 1 months ago
Online BCI Implementation of High-Frequency Phase Modulated Visual Stimuli
Abstract. Brain computer interfaces (BCI) that use the steady-statevisual-evoked-potential (SSVEP) as neural source, offer two main advantages over other types of BCIs: shorter ca...
Danhua Zhu, Gary Garcia Molina, Vojkan Mihajlovic,...
« Prev « First page 1043 / 1166 Last » Next »