Sciweavers

7059 search results - page 1341 / 1412
» Bayesian network management
Sort
View
WWW
2008
ACM
14 years 9 months ago
Lock-free consistency control for web 2.0 applications
Online collaboration and sharing is the central theme of many webbased services that create the so-called Web 2.0 phenomena. Using the Internet as a computing platform, many Web 2...
Jiangming Yang, Haixun Wang, Ning Gu, Yiming Liu, ...
WWW
2005
ACM
14 years 9 months ago
An abuse-free fair contract signing protocol based on the RSA signature
A fair contract signing protocol allows two potentially mistrusted parities to exchange their commitments (i.e., digital signatures) to an agreed contract over the Internet in a f...
Guilin Wang
WWW
2003
ACM
14 years 9 months ago
Buffer Sharing for Proxy Caching of Streaming Sessions
With the falling price of the memory, an increasing number of multimedia servers and proxies are now equipped with a large memory space. Caching media objects in the memory of a p...
Songqing Chen, Bo Shen, Yong Yan, Xiaodong Zhang
KDD
2009
ACM
194views Data Mining» more  KDD 2009»
14 years 9 months ago
Combining link and content for community detection: a discriminative approach
In this paper, we consider the problem of combining link and content analysis for community detection from networked data, such as paper citation networks and Word Wide Web. Most ...
Tianbao Yang, Rong Jin, Yun Chi, Shenghuo Zhu
KDD
2009
ACM
159views Data Mining» more  KDD 2009»
14 years 9 months ago
Mining brain region connectivity for alzheimer's disease study via sparse inverse covariance estimation
Effective diagnosis of Alzheimer's disease (AD), the most common type of dementia in elderly patients, is of primary importance in biomedical research. Recent studies have de...
Liang Sun, Rinkal Patel, Jun Liu, Kewei Chen, Tere...
« Prev « First page 1341 / 1412 Last » Next »