Sciweavers

2845 search results - page 561 / 569
» Constraints over Ontologies
Sort
View
KDD
2010
ACM
304views Data Mining» more  KDD 2010»
13 years 7 months ago
Automatic malware categorization using cluster ensemble
Malware categorization is an important problem in malware analysis and has attracted a lot of attention of computer security researchers and anti-malware industry recently. Todayâ...
Yanfang Ye, Tao Li, Yong Chen, Qingshan Jiang
PVLDB
2010
342views more  PVLDB 2010»
13 years 7 months ago
CRIUS: User-Friendly Database Design
Non-technical users are increasingly adding structures to their data. This gives rise to the need for database design. However, traditional database design is deliberate and heavy...
Li Qian, Kristen LeFevre, H. V. Jagadish
RTAS
2010
IEEE
13 years 7 months ago
Multi-Application Deployment in Shared Sensor Networks Based on Quality of Monitoring
Abstract—Wireless sensor networks are evolving from dedicated application-speciï¬c platforms to integrated infrastructure shared by multiple applications. Shared sensor networks...
Sangeeta Bhattacharya, Abusayeed Saifullah, Chenya...
SIAMJO
2010
246views more  SIAMJO 2010»
13 years 7 months ago
A Singular Value Thresholding Algorithm for Matrix Completion
This paper introduces a novel algorithm to approximate the matrix with minimum nuclear norm among all matrices obeying a set of convex constraints. This problem may be understood a...
Jian-Feng Cai, Emmanuel J. Candès, Zuowei S...
SIAMJO
2010
107views more  SIAMJO 2010»
13 years 7 months ago
Second-Order Analysis of Polyhedral Systems in Finite and Infinite Dimensions with Applications to Robust Stability of Variation
Abstract. This paper concerns second-order analysis for a remarkable class of variational systems in ï¬nite-dimensional and inï¬nite-dimensional spaces, which is particularly imp...
René Henrion, Boris S. Mordukhovich, Nguyen...