Sciweavers

1816 search results - page 214 / 364
» Trace oblivious computation
Sort
View
NSDI
2008
13 years 11 months ago
Peeking into Spammer Behavior from a Unique Vantage Point
Understanding the spammer behavior is a critical step in the long-lasting battle against email spams. Previous studies have focused on setting up honeypots or email sinkholes cont...
Abhinav Pathak, Y. Charlie Hu, Zhuoqing Morley Mao
ACMDIS
2008
ACM
13 years 11 months ago
The past is a different place: they do things differently there
This paper reports the trial of a wearable data capture device, SenseCam, as a resource for digital narratives and uses data from the trial to reflect on the models of the ,,mind ...
Richard H. R. Harper, David W. Randall, Nicola Smy...
DEDS
2008
87views more  DEDS 2008»
13 years 9 months ago
On-Line Monitoring of Large Petri Net Models Under Partial Observation
This paper deals with the on-line monitoring of large systems modeled as Petri Nets under partial observation. The plant observation is given by a subset of transitions whose occu...
George Jiroveanu, René K. Boel, Behzad Bord...
CIKM
2010
Springer
13 years 7 months ago
Top-Eye: top-k evolving trajectory outlier detection
The increasing availability of large-scale location traces creates unprecedent opportunities to change the paradigm for identifying abnormal moving activities. Indeed, various asp...
Yong Ge, Hui Xiong, Zhi-hua Zhou, Hasan Ozdemir, J...
CVPR
2007
IEEE
14 years 11 months ago
Active Visual Object Reconstruction using D-, E-, and T-Optimal Next Best Views
In visual 3-D reconstruction tasks with mobile cameras, one wishes to move the cameras so that they provide the views that lead to the best reconstruction result. When the camera ...
Stefan Wenhardt, Benjamin Deutsch, Elli Angelopoul...