Sciweavers

2977 search results - page 569 / 596
» Evaluating the Effectiveness of Keyword Search
Sort
View
WWW
2002
ACM
14 years 8 months ago
Protecting electronic commerce from distributed denial-of-service attacks
It is widely recognized that distributed denial-of-service (DDoS) attacks can disrupt electronic commerce and cause large revenue losses. However, effective defenses continue to b...
José Carlos Brustoloni
MOBISYS
2009
ACM
14 years 8 months ago
Leakage-aware energy synchronization for wireless sensor networks
To ensure sustainable operations of wireless sensor systems, environmental energy harvesting has been regarded as the right solution for long-term applications. In energy-dynamic ...
Ting Zhu, Ziguo Zhong, Yu Gu, Tian He, Zhi-Li Zhan...
MOBIHOC
2009
ACM
14 years 8 months ago
Fault tolerant target tracking in sensor networks
In this paper, we present a Gaussian mixture model based approach to capture the spatial characteristics of any target signal in a sensor network, and further propose a temporally...
Min Ding, Xiuzhen Cheng
KDD
2007
ACM
132views Data Mining» more  KDD 2007»
14 years 8 months ago
LungCAD: a clinically approved, machine learning system for lung cancer detection
We present LungCAD, a computer aided diagnosis (CAD) system that employs a classification algorithm for detecting solid pulmonary nodules from CT thorax studies. We briefly descri...
R. Bharat Rao, Jinbo Bi, Glenn Fung, Marcos Salgan...
SIGMOD
2008
ACM
191views Database» more  SIGMOD 2008»
14 years 7 months ago
Efficient aggregation for graph summarization
Graphs are widely used to model real world objects and their relationships, and large graph datasets are common in many application domains. To understand the underlying character...
Yuanyuan Tian, Richard A. Hankins, Jignesh M. Pate...