Sciweavers

102291 search results - page 20329 / 20459
» Computability in Computational Geometry
Sort
View
GAMESEC
2010
244views Game Theory» more  GAMESEC 2010»
15 years 1 months ago
The Password Game: Negative Externalities from Weak Password Practices
The combination of username and password is widely used as a human authentication mechanism on the Web. Despite this universal adoption and despite their long tradition, password s...
Sören Preibusch, Joseph Bonneau
GIS
2010
ACM
15 years 1 months ago
Using location based social networks for quality-aware participatory data transfer
The sensing systems that monitor physical environments rely on communication infrastructures (wired or wireless) to collect data from the sensors embedded in the environment. Howe...
Houtan Shirani-Mehr, Farnoush Banaei Kashani, Cyru...
183
Voted
ICDM
2010
IEEE
264views Data Mining» more  ICDM 2010»
15 years 1 months ago
Block-GP: Scalable Gaussian Process Regression for Multimodal Data
Regression problems on massive data sets are ubiquitous in many application domains including the Internet, earth and space sciences, and finances. In many cases, regression algori...
Kamalika Das, Ashok N. Srivastava
133
Voted
ICDM
2010
IEEE
115views Data Mining» more  ICDM 2010»
15 years 1 months ago
Polishing the Right Apple: Anytime Classification Also Benefits Data Streams with Constant Arrival Times
Classification of items taken from data streams requires algorithms that operate in time sensitive and computationally constrained environments. Often, the available time for class...
Jin Shieh, Eamonn J. Keogh
ICDM
2010
IEEE
230views Data Mining» more  ICDM 2010»
15 years 1 months ago
Clustering Large Attributed Graphs: An Efficient Incremental Approach
In recent years, many networks have become available for analysis, including social networks, sensor networks, biological networks, etc. Graph clustering has shown its effectivenes...
Yang Zhou, Hong Cheng, Jeffrey Xu Yu
« Prev « First page 20329 / 20459 Last » Next »