Sciweavers

2526 search results - page 333 / 506
» A Comparative Evaluation of Name-Matching Algorithms
Sort
View
ICPPW
2009
IEEE
15 years 10 months ago
The Owner Share Scheduler for a Distributed System
Abstract—In large distributed systems, where shared resources are owned by distinct entities, there is a need to reflect resource ownership in resource allocation. An appropriat...
Jose Nelson Falavinha Junior, Aleardo Manacero Jun...
EDBT
2010
ACM
202views Database» more  EDBT 2010»
15 years 10 months ago
Querying trajectories using flexible patterns
The wide adaptation of GPS and cellular technologies has created many applications that collect and maintain large repositories of data in the form of trajectories. Previous work ...
Marcos R. Vieira, Petko Bakalov, Vassilis J. Tsotr...
139
Voted
ICC
2007
IEEE
164views Communications» more  ICC 2007»
15 years 10 months ago
A Framework of Attacker Centric Cyber Attack Behavior Analysis
—Cyber attack behavior analysis can be roughly classified as “network centric” and “attacker centric” approaches. Compared with traditional “network centric” approach...
Xuena Peng, Hong Zhao
ICDCS
2007
IEEE
15 years 10 months ago
EnviroMic: Towards Cooperative Storage and Retrieval in Audio Sensor Networks
This paper presents the design, implementation, and evaluation of EnviroMic, a novel distributed acoustic monitoring, storage, and trace retrieval system. Audio represents one of ...
Liqian Luo, Qing Cao, Chengdu Huang, Tarek F. Abde...
SEMCO
2007
IEEE
15 years 10 months ago
Integrating Semantic Knowledge into Text Similarity and Information Retrieval
This paper studies the influence of lexical semantic knowledge upon two related tasks: ad-hoc information retrieval and text similarity. For this purpose, we compare the performa...
Christof Müller, Iryna Gurevych, Max Müh...