Sciweavers

2620 search results - page 510 / 524
» An Evaluation Technique for Binarization Algorithms
Sort
View
DMIN
2006
111views Data Mining» more  DMIN 2006»
13 years 9 months ago
Profiling and Clustering Internet Hosts
Identifying groups of Internet hosts with a similar behavior is very useful for many applications of Internet security control, such as DDoS defense, worm and virus detection, dete...
Songjie Wei, Jelena Mirkovic, Ezra Kissel
SWAP
2007
13 years 9 months ago
Reasoning with Instances of Heterogeneous Ontologies
We address the problem of reasoning with instances of heterogeneously formalized ontologies. Given a set of semantic mappings, reconciling conceptual and instance level heterogenei...
Luciano Serafini, Andrei Tamilin
CIDR
2009
140views Algorithms» more  CIDR 2009»
13 years 8 months ago
Energy Efficiency: The New Holy Grail of Data Management Systems Research
Energy costs are quickly rising in large-scale data centers and are soon projected to overtake the cost of hardware. As a result, data center operators have recently started turni...
Stavros Harizopoulos, Mehul A. Shah, Justin Meza, ...
ATAL
2010
Springer
13 years 8 months ago
Avoiding the prisoner's dilemma in auction-based negotiations for highly rugged utility spaces
There is a number of recent research lines addressing complex negotiations in highly rugged utility spaces. However, most of them focus on overcoming the problems imposed by the c...
Ivan Marsá-Maestre, Miguel A. López-...
ICASSP
2010
IEEE
13 years 8 months ago
Automatic matched filter recovery via the audio camera
The sound reaching the acoustic sensor in a realistic environment contains not only the part arriving directly from the sound source but also a number of environmental re ections....
Adam O'Donovan, Ramani Duraiswami, Dmitry N. Zotki...