Sciweavers

2620 search results - page 155 / 524
» An Evaluation Technique for Binarization Algorithms
Sort
View
AAAI
2006
13 years 9 months ago
Analysis of Privacy Loss in Distributed Constraint Optimization
Distributed Constraint Optimization (DCOP) is rapidly emerging as a prominent technique for multiagent coordination. However, despite agent privacy being a key motivation for appl...
Rachel Greenstadt, Jonathan P. Pearce, Milind Tamb...
ACST
2006
13 years 9 months ago
Distributed hierarchical document clustering
This paper investigates the applicability of distributed clustering technique, called RACHET [1], to organize large sets of distributed text data. Although the authors of RACHET c...
Debzani Deb, M. Muztaba Fuad, Rafal A. Angryk
MCAM
2007
Springer
127views Multimedia» more  MCAM 2007»
14 years 2 months ago
An Optimized Topology Maintenance Framework for P2P Media Streaming
In this paper, we present an optimized topology maintenance framework used in AVStreamer P2P media streaming system. To help new incoming clients get an initial view of the whole n...
Rui Guo, Longshe Huo, Qiang Fu, Shuangjia Chen, We...
ACSC
2005
IEEE
14 years 1 months ago
Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters
Most current network intrusion detection systems employ signature-based methods or data mining-based methods which rely on labelled training data. This training data is typically ...
Kingsly Leung, Christopher Leckie
PVLDB
2008
104views more  PVLDB 2008»
13 years 7 months ago
Efficient skyline querying with variable user preferences on nominal attributes
Current skyline evaluation techniques assume a fixed ordering on the attributes. However, dynamic preferences on nominal attributes are more realistic in known applications. In or...
Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Jian Pei, ...