Sciweavers

334 search results - page 64 / 67
» Capturing Web Services Provider Constraints - An Algorithmic...
Sort
View
TCSV
2008
107views more  TCSV 2008»
13 years 7 months ago
Person Surveillance Using Visual and Infrared Imagery
This paper presents a methodology for analyzing multimodal and multiperspective systems for person surveillance. Using an experimental testbed consisting of two color and two infra...
Stephen J. Krotosky, Mohan M. Trivedi
SIGMOD
2010
ACM
260views Database» more  SIGMOD 2010»
14 years 9 days ago
Towards proximity pattern mining in large graphs
Mining graph patterns in large networks is critical to a variety of applications such as malware detection and biological module discovery. However, frequent subgraphs are often i...
Arijit Khan, Xifeng Yan, Kun-Lung Wu
KDD
2007
ACM
193views Data Mining» more  KDD 2007»
14 years 7 months ago
Joint optimization of wrapper generation and template detection
Many websites have large collections of pages generated dynamically from an underlying structured source like a database. The data of a category are typically encoded into similar...
Shuyi Zheng, Ruihua Song, Ji-Rong Wen, Di Wu
WWW
2003
ACM
14 years 8 months ago
Super-peer-based routing and clustering strategies for RDF-based peer-to-peer networks
RDF-based P2P networks have a number of advantages compared with simpler P2P networks such as Napster, Gnutella or with approaches based on distributed indices such as CAN and CHO...
Alexander Löser, Christoph Schmitz, Ingo Brun...
CN
2004
130views more  CN 2004»
13 years 7 months ago
The effect of bandwidth and buffer pricing on resource allocation and QoS
Congestion-based pricing of network resources is a common approach in evolving network architectures that support Quality of Service (QoS). Resource usage and QoS will thus fluctu...
Nan Jin, Scott Jordan