Sciweavers

1955 search results - page 285 / 391
» Can Computers Handle Adverbs
Sort
View
EDBT
2008
ACM
149views Database» more  EDBT 2008»
16 years 4 months ago
A probabilistic trust model for semantic peer to peer systems
Semantic peer to peer (P2P) systems are fully decentralized overlay networks of people or machines (called peers) sharing and searching varied resources (documents, videos, photos...
Gia Hien Nguyen, Philippe Chatalic, Marie-Christin...
PERCOM
2007
ACM
16 years 4 months ago
A Cooperative MAC Protocol for Ad Hoc Wireless Networks
Cooperative communications fully leverages the broadcast nature of the wireless channel and spatial diversity, thereby achieving tremendous improvements in system capacity and dela...
Thanasis Korakis, Zhifeng Tao, Yevgeniy Slutskiy, ...
PERCOM
2003
ACM
16 years 4 months ago
A High Performance Privacy-Oriented Location System
Many mobile applications can be greatly enhanced when provided with the locations of people and devices. Ultrasonic location systems have been shown to supply location information...
Mike Hazas, Andy Ward
137
Voted
SDM
2009
SIAM
114views Data Mining» more  SDM 2009»
16 years 1 months ago
GAD: General Activity Detection for Fast Clustering on Large Data.
In this paper, we propose GAD (General Activity Detection) for fast clustering on large scale data. Within this framework we design a set of algorithms for different scenarios: (...
Jiawei Han, Liangliang Cao, Sangkyum Kim, Xin Jin,...
SDM
2009
SIAM
291views Data Mining» more  SDM 2009»
16 years 1 months ago
Detection and Characterization of Anomalies in Multivariate Time Series.
Anomaly detection in multivariate time series is an important data mining task with applications to ecosystem modeling, network traffic monitoring, medical diagnosis, and other d...
Christopher Potter, Haibin Cheng, Pang-Ning Tan, S...