Sciweavers

1931 search results - page 237 / 387
» A BitTorrent Performance Evaluation Framework
Sort
View
KDD
2012
ACM
187views Data Mining» more  KDD 2012»
11 years 11 months ago
Unsupervised feature selection for linked social media data
The prevalent use of social media produces mountains of unlabeled, high-dimensional data. Feature selection has been shown effective in dealing with high-dimensional data for eï¬...
Jiliang Tang, Huan Liu
ICIP
2007
IEEE
14 years 11 months ago
Stream Authentication Based on Generlized Butterfly Graph
This paper proposes a stream authentication method based on the Generalized Butterfly Graph (GBG) framework. Compared with the original Butterfly graph, the proposed GBG graph sup...
Zhishou Zhang, John G. Apostolopoulos, Qibin Sun, ...
ICDE
2005
IEEE
154views Database» more  ICDE 2005»
14 years 10 months ago
Deep Store: an Archival Storage System Architecture
We present the Deep Store archival storage architecture, a large-scale storage system that stores immutable data efficiently and reliably for long periods of time. Archived data i...
Lawrence You, Kristal T. Pollack, Darrell D. E. Lo...
MICCAI
2006
Springer
14 years 10 months ago
Automatic Point Landmark Matching for Regularizing Nonlinear Intensity Registration: Application to Thoracic CT Images
Nonlinear image registration is a prerequisite for a variety of medical image analysis tasks. A frequently used registration method is based on manually or automatically derived po...
Martin Urschler, Christopher Zach, Hendrik Ditt, H...
PERCOM
2009
ACM
14 years 9 months ago
DTT: A Distributed Trust Toolkit for Pervasive Systems
Effective security mechanisms are essential to the widespread deployment of pervasive systems. Much of the research focus on security in pervasive computing has revolved around dis...
Brent Lagesse, Mohan Kumar, Justin Mazzola Paluska...