Sciweavers

1663 search results - page 308 / 333
» Computer Security in the Real World
Sort
View
156
Voted
PAMI
2007
196views more  PAMI 2007»
15 years 3 months ago
Clustering and Embedding Using Commute Times
This paper exploits the properties of the commute time between nodes of a graph for the purposes of clustering and embedding, and explores its applications to image segmentation a...
Huaijun Qiu, Edwin R. Hancock
114
Voted
CIKM
2010
Springer
15 years 2 months ago
Mapping web pages to database records via link paths
In this paper we propose a new knowledge management task which aims to map Web pages to their corresponding records in a structured database. For example, the DBLP database contai...
Tim Weninger, Fabio Fumarola, Jiawei Han, Donato M...
116
Voted
PVLDB
2010
110views more  PVLDB 2010»
15 years 2 months ago
Read-Once Functions and Query Evaluation in Probabilistic Databases
Probabilistic databases hold promise of being a viable means for large-scale uncertainty management, increasingly needed in a number of real world applications domains. However, q...
Prithviraj Sen, Amol Deshpande, Lise Getoor
139
Voted
DIALM
2010
ACM
194views Algorithms» more  DIALM 2010»
15 years 1 months ago
Prioritized gossip in vehicular networks
We present a method for using real world mobility traces to identify tractable theoretical models for the study of distributed algorithms in mobile networks. We validate the metho...
Alejandro Cornejo, Calvin C. Newport
149
Voted
TRIDENTCOM
2010
IEEE
15 years 1 months ago
Polymorphic Ubiquitous Network Testbed RUBIQ
In this paper we present RUBIQ, a polymorphic ubiquitous network testbed. RUBIQ works on StarBED, which is a network testbed consisting of hundreds of PCs connected to each other. ...
Junya Nakata, Razvan Beuran, Takashi Okada, Ken-ic...