Sciweavers

2821 search results - page 116 / 565
» Tracing a single user
Sort
View
INFOCOM
2000
IEEE
14 years 1 months ago
Variance of Aggregated Web Traffic
Abstract-If data traffic were Poisson, increases in the amount of traffic aggregated on a network would rapidly decrease the relative size of bursts. The discovery of pervasive lon...
Robert Morris, Dong Lin
JODS
2008
123views Data Mining» more  JODS 2008»
13 years 9 months ago
A Fine-Grained Approach to Resolving Unsatisfiable Ontologies
The ability to deal with inconsistencies and to evaluate the impact of possible solutions for resolving inconsistencies are of the utmost importance in real world ontology applicat...
Joey Sik Chun Lam, Derek H. Sleeman, Jeff Z. Pan, ...
ICIP
2004
IEEE
14 years 11 months ago
Progressive protection of jpeg2000 codestreams
This paper presents an authentication scheme and an access control scheme for JPEG2000 image codestreams based on hash chains. Both schemes are fully compatible with the core part...
Yongdong Wu, Di Ma, Robert H. Deng
IWPC
2009
IEEE
14 years 4 months ago
OGAN: Visualizing object interaction scenarios based on dynamic interaction context
Visualizing an execution trace of an object-oriented system as sequence diagrams is effective to understand the behavior of the system. To support developers to understand concret...
Munakata Satoshi, Takashi Ishio, Katsuro Inoue
QEST
2008
IEEE
14 years 4 months ago
Debugging of Dependability Models Using Interactive Visualization of Counterexamples
Abstract—We present an approach to support the debugging of stochastic system models using interactive visualization. The goal of this work is to facilitate the identification o...
Husain Aljazzar, Stefan Leue