Sciweavers

1816 search results - page 362 / 364
» Trace oblivious computation
Sort
View
DKE
2010
167views more  DKE 2010»
13 years 6 months ago
Discovering private trajectories using background information
Trajectories are spatio-temporal traces of moving objects which contain valuable information to be harvested by spatio-temporal data mining techniques. Applications like city traf...
Emre Kaplan, Thomas Brochmann Pedersen, Erkay Sava...
WWW
2011
ACM
13 years 3 months ago
we.b: the web of short urls
Short URLs have become ubiquitous. Especially popular within social networking services, short URLs have seen a significant increase in their usage over the past years, mostly du...
Demetres Antoniades, Iasonas Polakis, Georgios Kon...
JGS
2010
106views more  JGS 2010»
13 years 3 months ago
On vector autoregressive modeling in space and time
Despite the fact that it provides a potentially useful analytical tool, allowing for the joint modeling of dynamic interdependencies within a group of connected areas, until latel...
Valter Di Giacinto
TPDS
2010
154views more  TPDS 2010»
13 years 3 months ago
Adaptive Workload Prediction of Grid Performance in Confidence Windows
Predicting grid performance is a complex task because heterogeneous resource nodes are involved in a distributed environment. Long execution workload on a grid is even harder to pr...
Yongwei Wu, Kai Hwang, Yulai Yuan, Weimin Zheng
TVLSI
2010
13 years 3 months ago
Architectural Enhancement and System Software Support for Program Code Integrity Monitoring in Application-Specific Instruction-
Program code in a computer system can be altered either by malicious security attacks or by various faults in microprocessors. At the instruction level, all code modifications are ...
Hai Lin, Yunsi Fei, Xuan Guan, Zhijie Jerry Shi