Sciweavers

14518 search results - page 2897 / 2904
» Two Problems for Sophistication
Sort
View
146
Voted
INFOCOM
2012
IEEE
13 years 6 months ago
Threshold compression for 3G scalable monitoring
—We study the problem of scalable monitoring of operational 3G wireless networks. Threshold-based performance monitoring in large 3G networks is very challenging for two main fac...
Suk-Bok Lee, Dan Pei, MohammadTaghi Hajiaghayi, Io...
160
Voted
ISSTA
2012
ACM
13 years 6 months ago
ViewPoints: differential string analysis for discovering client- and server-side input validation inconsistencies
Since web applications are easily accessible, and often store a large amount of sensitive user information, they are a common target for attackers. In particular, attacks that foc...
Muath Alkhalaf, Shauvik Roy Choudhary, Mattia Fazz...
158
Voted
KDD
2012
ACM
263views Data Mining» more  KDD 2012»
13 years 6 months ago
Integrating community matching and outlier detection for mining evolutionary community outliers
Temporal datasets, in which data evolves continuously, exist in a wide variety of applications, and identifying anomalous or outlying objects from temporal datasets is an importan...
Manish Gupta, Jing Gao, Yizhou Sun, Jiawei Han
168
Voted
SIGIR
2012
ACM
13 years 6 months ago
An uncertainty-aware query selection model for evaluation of IR systems
We propose a mathematical framework for query selection as a mechanism for reducing the cost of constructing information retrieval test collections. In particular, our mathematica...
Mehdi Hosseini, Ingemar J. Cox, Natasa Milic-Frayl...
174
Voted
CVPR
2012
IEEE
13 years 6 months ago
Supervised hashing with kernels
Recent years have witnessed the growing popularity of hashing in large-scale vision problems. It has been shown that the hashing quality could be boosted by leveraging supervised ...
Wei Liu, Jun Wang, Rongrong Ji, Yu-Gang Jiang, Shi...
« Prev « First page 2897 / 2904 Last » Next »