Sciweavers

1950 search results - page 216 / 390
» Varieties of Increasing Trees
Sort
View
SP
2006
IEEE
14 years 4 months ago
Locating Hidden Servers
Hidden services were deployed on the Tor anonymous communication network in 2004. Announced properties include server resistance to distributed DoS. Both the EFF and Reporters Wit...
Lasse Øverlier, Paul F. Syverson
NPAR
2006
ACM
14 years 4 months ago
Stylizing 2.5-D video
In recent years considerable interest has been given to nonphotorealistic rendering of photographs, video, and 3D models for illustrative or artistic purposes. Conventional 2D inp...
Noah Snavely, C. Lawrence Zitnick, Sing Bing Kang,...
SAC
2006
ACM
14 years 4 months ago
Two-phase clustering strategy for gene expression data sets
In the context of genome research, the method of gene expression analysis has been used for several years. Related microarray experiments are conducted all over the world, and con...
Dirk Habich, Thomas Wächter, Wolfgang Lehner,...
VALUETOOLS
2006
ACM
166views Hardware» more  VALUETOOLS 2006»
14 years 4 months ago
Fairness considerations of scheduling in multi-server and multi-queue systems
— Multi-server and multi-queue architectures are common mechanisms used in a large variety of applications (call centers, Web services, computer systems). One of the major motiva...
David Raz, Benjamin Avi-Itzhak, Hanoch Levy
ACSAC
2005
IEEE
14 years 4 months ago
Design and Implementation of an Extrusion-based Break-In Detector for Personal Computers
An increasing variety of malware, such as worms, spyware and adware, threatens both personal and business computing. Remotely controlled bot networks of compromised systems are gr...
Weidong Cui, Randy H. Katz, Wai-tian Tan