Sciweavers

3474 search results - page 617 / 695
» Data Management in RFID Applications
Sort
View
CIKM
2006
Springer
15 years 8 months ago
Privacy preserving sequential pattern mining in distributed databases
Research in the areas of privacy preserving techniques in databases and subsequently in privacy enhancement technologies have witnessed an explosive growth-spurt in recent years. ...
Vishal Kapoor, Pascal Poncelet, François Tr...
ESCIENCE
2006
IEEE
15 years 8 months ago
The Design and Implementation of the Transatlantic Mission-Oriented Production and Experimental Networks
In this paper we present the design and implementation of the mission-oriented USLHCNet for HEP research community and the UltraLight network testbed. The design philosophy for th...
Harvey B. Newman, Dimitri Bourilkov, Julian J. Bun...
WSC
2008
15 years 6 months ago
Empowering decision support with simulation technology - Scenario Navigator
The commercial simulation environments that are available today focus primarily on the development of simulation models. They are designed for a single user. They provide animatio...
Edwin Valentin, Renk A. Bijlsma, Vincent de Gast
CIKM
2008
Springer
15 years 6 months ago
Representative entry selection for profiling blogs
Many applications on blog search and mining often meet the challenge of handling huge volume of blog data, in which one single blog could contain hundreds or even thousands of ent...
Jinfeng Zhuang, Steven C. H. Hoi, Aixin Sun, Rong ...
130
Voted
CIKM
2008
Springer
15 years 6 months ago
Proactive learning: cost-sensitive active learning with multiple imperfect oracles
Proactive learning is a generalization of active learning designed to relax unrealistic assumptions and thereby reach practical applications. Active learning seeks to select the m...
Pinar Donmez, Jaime G. Carbonell