Sciweavers

603 search results - page 82 / 121
» Advances in constrained clustering
Sort
View
WWW
2003
ACM
14 years 10 months ago
Social Network Extraction of Conference Participants
In a ubiquitous computing environment, it is desirable to provide a user with information depending on a user's situation, such as time, location, user behavior, and social c...
Hironori Tomobe, Kôiti Hasida, Mitsuru Ishiz...
OSDI
2008
ACM
14 years 10 months ago
Predicting Computer System Failures Using Support Vector Machines
Mitigating the impact of computer failure is possible if accurate failure predictions are provided. Resources, applications, and services can be scheduled around predicted failure...
Errin W. Fulp, Glenn A. Fink, Jereme N. Haack
SSDBM
2005
IEEE
184views Database» more  SSDBM 2005»
14 years 3 months ago
Optimizing Multiple Top-K Queries over Joins
Advanced Data Mining applications require more and more support from relational database engines. Especially clustering applications in high dimensional features space demand a pr...
Dirk Habich, Wolfgang Lehner, Alexander Hinneburg
ICNC
2005
Springer
14 years 3 months ago
A Multi-cluster Grid Enabled Evolution Framework for Aerodynamic Airfoil Design Optimization
Advances in grid computing have recently sparkled the research and development of Grid problem solving environments for complex design. Parallelism in the form of distributed compu...
Hee-Khiang Ng, Dudy Lim, Yew-Soon Ong, Bu-Sung Lee...
ISI
2005
Springer
14 years 3 months ago
Collecting and Analyzing the Presence of Terrorists on the Web: A Case Study of Jihad Websites
Abstract. The Internet which has enabled global businesses to flourish has become the very same channel for mushrooming ‘terrorist news networks.’ Terrorist organizations and t...
Edna Reid, Jialun Qin, Yilu Zhou, Guanpi Lai, Marc...