Sciweavers

868 search results - page 123 / 174
» Finding Most Likely Solutions
Sort
View
ADC
2010
Springer
214views Database» more  ADC 2010»
13 years 4 months ago
Building a dynamic classifier for large text data collections
Due to the lack of in-built tools to navigate the web, people have to use external solutions to find information. The most popular of these are search engines and web directories....
Pavel Kalinov, Bela Stantic, Abdul Sattar
TKDE
2012
229views Formal Methods» more  TKDE 2012»
11 years 11 months ago
Effective Pattern Discovery for Text Mining
—Many data mining techniques have been proposed for mining useful patterns in text documents. However, how to effectively use and update discovered patterns is still an open rese...
Ning Zhong, Yuefeng Li, Sheng-Tang Wu
EDBT
2008
ACM
159views Database» more  EDBT 2008»
14 years 9 months ago
Automaton in or out: run-time plan optimization for XML stream processing
Many systems such as Tukwila and YFilter combine automaton and algebra techniques to process queries over tokenized XML streams. Typically in this architecture, an automaton is fi...
Hong Su, Elke A. Rundensteiner, Murali Mani
MOBISYS
2007
ACM
14 years 8 months ago
Simplifying cyber foraging for mobile devices
Cyber foraging is the transient and opportunistic use of compute servers by mobile devices. The short market life of such devices makes rapid modification of applications for remo...
Rajesh Krishna Balan, Darren Gergle, Mahadev Satya...
GLOBECOM
2006
IEEE
14 years 3 months ago
Defense against Routing Disruption Attacks in Mobile Ad Hoc Networks
—We propose a secure routing architecture for Mobile Ad hoc NETworks (MANETs) called ThroughpUt-Feedback (TUF) routing, which is resilient against a wide range of routing disrupt...
Ruiliang Chen, Michael Snow, Jung Min Park, M. Tam...