Sciweavers

459 search results - page 80 / 92
» Detecting Spam at the Network Level
Sort
View
KDD
2007
ACM
168views Data Mining» more  KDD 2007»
14 years 8 months ago
Finding tribes: identifying close-knit individuals from employment patterns
We present a family of algorithms to uncover tribes--groups of individuals who share unusual sequences of affiliations. While much work inferring community structure describes lar...
Lisa Friedland, David Jensen
ICPPW
2002
IEEE
14 years 16 days ago
MigThread: Thread Migration in DSM Systems
Distributed Shared Memory (DSM) systems provide a logically shared memory over physically distributed memory to enable parallel computation on Networks of Workstations (NOWs). In ...
Hai Jiang, Vipin Chaudhary
INFOCOM
2000
IEEE
13 years 12 months ago
A QoS-Aware Multicast Routing Protocol
—The future Internet is expected to support multicast applications with quality of service (QoS) requirements. To facilitate this, QoS multicast routing protocols are pivotal in ...
Shigang Chen, Klara Nahrstedt, Yuval Shavitt
IJCV
2007
134views more  IJCV 2007»
13 years 7 months ago
Multi-sensory and Multi-modal Fusion for Sentient Computing
This paper presents an approach to multi-sensory and multi-modal fusion in which computer vision information obtained from calibrated cameras is integrated with a large-scale sent...
Christopher Town
WS
2010
ACM
13 years 6 months ago
Anomalies in ontologies with rules
For the development of practical semantic applications, ontologies are commonly used with rule extensions. Prominent examples of semantic applications are Semantic Wikis, Semantic...
Joachim Baumeister, Dietmar Seipel