Sciweavers

10792 search results - page 2152 / 2159
» An Evaluation of Non-Equijoin Algorithms
Sort
View
SIGIR
2008
ACM
13 years 9 months ago
Learning to rank at query-time using association rules
Some applications have to present their results in the form of ranked lists. This is the case of many information retrieval applications, in which documents must be sorted accordi...
Adriano Veloso, Humberto Mossri de Almeida, Marcos...
SIGKDD
2008
125views more  SIGKDD 2008»
13 years 9 months ago
Incremental pattern discovery on streams, graphs and tensors
Incremental pattern discovery targets streaming applications where the data continuously arrive incrementally. The questions are how to find patterns (main trends) incrementally; ...
Jimeng Sun
SIGMETRICS
2008
ACM
140views Hardware» more  SIGMETRICS 2008»
13 years 9 months ago
Scalable VPN routing via relaying
Enterprise customers are increasingly adopting MPLS (Multiprotocol Label Switching) VPN (Virtual Private Network) service that offers direct any-to-any reachability among the cust...
Changhoon Kim, Alexandre Gerber, Carsten Lund, Dan...
IJSNET
2007
169views more  IJSNET 2007»
13 years 9 months ago
ART: an asymmetric and reliable transport mechanism for wireless sensor networks
: Many applications developed for wireless sensor networks (WSNs) demand for Reliable communication service, since majority of these applications are event-critical applications. T...
Nurcan Tezcan, Wenye Wang
IJWIS
2007
153views more  IJWIS 2007»
13 years 9 months ago
A security framework for agent-based systems
Purpose – This paper aims to address some security issues in open systems such as service-oriented applications and grid computing. It proposes a security framework for these sy...
Jamal Bentahar, Francesca Toni, John-Jules Ch. Mey...
« Prev « First page 2152 / 2159 Last » Next »