Sciweavers

2821 search results - page 102 / 565
» Tracing a single user
Sort
View
133
Voted
CASCON
1997
85views Education» more  CASCON 1997»
15 years 5 months ago
Fast detection of communication patterns in distributed executions
Understanding distributed applications is a tedious and di cult task. Visualizations based on process-time diagrams are often used to obtain a better understanding of the executio...
Thomas Kunz, Michiel F. H. Seuren
137
Voted
NPC
2010
Springer
15 years 2 months ago
Differentiated Replication Strategy in Data Centers
Cloud computing has attracted a great deal of attention in both academia and industry. We envision the provision of differentiated services as being one of the key components to th...
Tung Nguyen, Anthony Cutway, Weisong Shi
140
Voted
SIGCOMM
2012
ACM
13 years 6 months ago
Predicting location using mobile phone calls
Location prediction using mobile phone traces has attracted increasing attention. Owing to the irregular user mobility patterns, it still remains challenging to predict user locat...
Daqiang Zhang, Athanasios V. Vasilakos, Haoyi Xion...
ICIP
2005
IEEE
16 years 5 months ago
Resistance analysis of scalable video fingerprinting systems under fair collusion attacks
Digital fingerprinting is an important tool in multimedia forensics to trace traitors and protect multimedia content after decryption. This paper addresses the enforcement of digi...
H. Vicky Zhao, K. J. Ray Liu
115
Voted
ATAL
2004
Springer
15 years 9 months ago
Experiments in Human Multi-Issue Negotiation: Analysis and Support
The purpose of this paper is to report on experiments in (human) multi-issue negotiation and their analysis, and to present a generic software environment supporting such an analy...
Tibor Bosse, Catholijn M. Jonker, Jan Treur