Sciweavers

91 search results - page 5 / 19
» A more reliable reduction algorithm for behavioral model ext...
Sort
View
EMSOFT
2007
Springer
14 years 1 months ago
Buffer optimization and dispatching scheme for embedded systems with behavioral transparency
Software components are modular and can enable post-deployment update, but their high overhead in runtime and memory is prohibitive for many embedded systems. This paper proposes ...
Jiwon Hahn, Pai H. Chou
ASUNAM
2009
IEEE
14 years 15 days ago
Filtering Spam in Social Tagging System with Dynamic Behavior Analysis
—Spam in social tagging systems introduced by some malicious participants has become a serious problem for its global popularizing. Some studies which can be deduced to static us...
Bo Liu, Ennan Zhai, Huiping Sun, Yelu Chen, Zhong ...
DATAMINE
2010
175views more  DATAMINE 2010»
13 years 7 months ago
Extracting influential nodes on a social network for information diffusion
We address the combinatorial optimization problem of finding the most influential nodes on a large-scale social network for two widely-used fundamental stochastic diffusion models...
Masahiro Kimura, Kazumi Saito, Ryohei Nakano, Hiro...
PVLDB
2010
110views more  PVLDB 2010»
13 years 5 months ago
Behavior Based Record Linkage
In this paper, we present a new record linkage approach that uses entity behavior to decide if potentially different entities are in fact the same. An entity’s behavior is extra...
Mohamed Yakout, Ahmed K. Elmagarmid, Hazem Elmelee...
JMLR
2010
105views more  JMLR 2010»
13 years 2 months ago
Collective Inference for Extraction MRFs Coupled with Symmetric Clique Potentials
Many structured information extraction tasks employ collective graphical models that capture interinstance associativity by coupling them with various clique potentials. We propos...
Rahul Gupta, Sunita Sarawagi, Ajit A. Diwan