Sciweavers

948 search results - page 170 / 190
» What can we achieve by arbitrary announcements
Sort
View
JMLR
2006
113views more  JMLR 2006»
13 years 7 months ago
On Inferring Application Protocol Behaviors in Encrypted Network Traffic
Several fundamental security mechanisms for restricting access to network resources rely on the ability of a reference monitor to inspect the contents of traffic as it traverses t...
Charles V. Wright, Fabian Monrose, Gerald M. Masso...
BMCBI
2010
104views more  BMCBI 2010»
13 years 2 months ago
A systematic study of genome context methods: calibration, normalization and combination
Background: Genome context methods have been introduced in the last decade as automatic methods to predict functional relatedness between genes in a target genome using the patter...
Luciana Ferrer, Joseph M. Dale, Peter D. Karp
CSCW
2007
ACM
13 years 7 months ago
Doing Virtually Nothing: Awareness and Accountability in Massively Multiplayer Online Worlds
To date the most popular and sophisticated types of virtual worlds can be found in the area of video gaming, especially in the genre of Massively Multiplayer Online Role Playing Ga...
Robert J. Moore, Nicolas Ducheneaut, Eric Nickell
ICIP
2007
IEEE
14 years 9 months ago
Compressed Sensing Image Reconstruction Via Recursive Spatially Adaptive Filtering
We introduce a new approach to image reconstruction from highly incomplete data. The available data are assumed to be a small collection of spectral coef?cients of an arbitrary li...
Karen O. Egiazarian, Alessandro Foi, Vladimir Katk...
FOCS
2008
IEEE
14 years 2 months ago
Algorithms for Single-Source Vertex Connectivity
In the Survivable Network Design Problem (SNDP) the goal is to find a minimum cost subset of edges that satisfies a given set of pairwise connectivity requirements among the ver...
Julia Chuzhoy, Sanjeev Khanna