Sciweavers

1051 search results - page 130 / 211
» Analyzing Resource Behavior Using Process Mining
Sort
View
KDD
2008
ACM
202views Data Mining» more  KDD 2008»
14 years 8 months ago
Data and Structural k-Anonymity in Social Networks
The advent of social network sites in the last years seems to be a trend that will likely continue. What naive technology users may not realize is that the information they provide...
Alina Campan, Traian Marius Truta
SAC
2011
ACM
12 years 11 months ago
Towards discovering criminal communities from textual data
In many criminal cases, forensically collected data contain valuable information about a suspect’s social networks. An investigator often has to manually extract information fro...
Rabeah Al-Zaidy, Benjamin C. M. Fung, Amr M. Youss...
HT
2007
ACM
13 years 12 months ago
Towards better understanding of folksonomic patterns
Folksonomies provide a free source of keywords describing web resources; however, these keywords are free form and their semantics spans multiple contextual dimension. In this pap...
Hend S. Al-Khalifa, Hugh C. Davis
ICASSP
2011
IEEE
12 years 11 months ago
Blind channel estimation for MPSK-based amplify-and-forward two-way relaying
We consider the problem of channel estimation for amplify-andforward (AF) two-way relay networks (TWRNs). The majority of works on this problem develop pilot-based algorithms that...
Saeed Abdallah, Ioannis N. Psaromiligkos
HIPEAC
2009
Springer
14 years 2 months ago
Predictive Runtime Code Scheduling for Heterogeneous Architectures
Heterogeneous architectures are currently widespread. With the advent of easy-to-program general purpose GPUs, virtually every recent desktop computer is a heterogeneous system. Co...
Víctor J. Jiménez, Lluís Vila...