Sciweavers

8243 search results - page 1615 / 1649
» Can We Manage Trust
Sort
View
IMC
2010
ACM
13 years 6 months ago
What happened in my network: mining network events from router syslogs
Router syslogs are messages that a router logs to describe a wide range of events observed by it. They are considered one of the most valuable data sources for monitoring network ...
Tongqing Qiu, Zihui Ge, Dan Pei, Jia Wang, Jun Xu
INFOCOM
2010
IEEE
13 years 6 months ago
Distributed Coordination with Deaf Neighbors: Efficient Medium Access for 60 GHz Mesh Networks
Multi-gigabit outdoor mesh networks operating in the unlicensed 60 GHz "millimeter (mm) wave" band, offer the possibility of a quickly deployable broadband extension of t...
Sumit Singh, Raghuraman Mudumbai, Upamanyu Madhow
SIGSOFT
2010
ACM
13 years 6 months ago
Locating need-to-translate constant strings in web applications
Software internationalization aims to make software accessible and usable by users all over the world. For a Java application that does not consider internationalization at the be...
Xiaoyin Wang, Lu Zhang, Tao Xie, Hong Mei, Jiasu S...
CLEF
2009
Springer
13 years 6 months ago
Clustering for Text and Image-Based Photo Retrieval at CLEF 2009
For this year's Image CLEF Photo Retrieval task, we have prepared 5 submission runs to help us assess the effectiveness of 1) image content-based retrieval, and 2) textbased ...
Qian Zhu, Diana Inkpen
EDM
2009
184views Data Mining» more  EDM 2009»
13 years 6 months ago
Process Mining Online Assessment Data
Traditional data mining techniques have been extensively applied to find interesting patterns, build descriptive and predictive models from large volumes of data accumulated throug...
Mykola Pechenizkiy, Nikola Trcka, Ekaterina Vasily...
« Prev « First page 1615 / 1649 Last » Next »