Sciweavers

1816 search results - page 299 / 364
» Trace oblivious computation
Sort
View
CCR
2010
169views more  CCR 2010»
13 years 8 months ago
On the leakage of personally identifiable information via online social networks
For purposes of this paper, we define "Personally identifiable information" (PII) as information which can be used to distinguish or trace an individual's identity ...
Balachander Krishnamurthy, Craig E. Wills
CGF
2010
189views more  CGF 2010»
13 years 8 months ago
Real-time Depth of Field Rendering via Dynamic Light Field Generation and Filtering
We present a new algorithm for efficient rendering of high-quality depth-of-field (DoF) effects. We start with a single rasterized view (reference view) of the scene, and sample t...
Xuan Yu, Rui Wang, Jingyi Yu
CMPB
2010
141views more  CMPB 2010»
13 years 8 months ago
Real-time segmentation by Active Geometric Functions
Recent advances in 4D imaging and real-time imaging provide image data with clinically important cardiac dynamic information at high spatial or temporal resolution. However, the en...
Qi Duan, Elsa D. Angelini, Andrew F. Laine
CCR
2008
94views more  CCR 2008»
13 years 8 months ago
Probabilistic lossy counting: an efficient algorithm for finding heavy hitters
Knowledge of the largest traffic flows in a network is important for many network management applications. The problem of finding these flows is known as the heavy-hitter problem ...
Xenofontas A. Dimitropoulos, Paul Hurley, Andreas ...
CCR
2008
86views more  CCR 2008»
13 years 8 months ago
The need for simulation in evaluating anomaly detectors
Anomalous events that affect the performance of networks are a fact of life. It is therefore not surprising that recent years have seen an explosion in research on network anomaly...
Haakon Ringberg, Matthew Roughan, Jennifer Rexford