Sciweavers

2334 search results - page 405 / 467
» How are Real Grids Used
Sort
View
ICDM
2009
IEEE
129views Data Mining» more  ICDM 2009»
14 years 4 months ago
Extended Boolean Matrix Decomposition
—With the vast increase in collection and storage of data, the problem of data summarization is most critical for effective data management. Since much of this data is categorica...
Haibing Lu, Jaideep Vaidya, Vijayalakshmi Atluri, ...
MM
2006
ACM
157views Multimedia» more  MM 2006»
14 years 4 months ago
Cyborglogging with camera phones: steps toward equiveillance
We present “equiveillance” as a conceptual framework for understanding the balance between surveillance and sousveillance. In addition to this conceptual framework we also pre...
Steve Mann, James Fung, Raymond Lo
WWW
2009
ACM
14 years 10 months ago
A search-based method for forecasting ad impression in contextual advertising
Contextual advertising (also called content match) refers to the placement of small textual ads within the content of a generic web page. It has become a significant source of rev...
Xuerui Wang, Andrei Z. Broder, Marcus Fontoura, Va...
IPSN
2010
Springer
14 years 4 months ago
User-centric radio power control for opportunistic mountain hiking networks
bstract: User-Centric Radio Power Control for Opportunistic Mountain Hiking Networks ∗ Jyh-How Huang1 , Po-Yen Lin1 , Yu-Te Huang2 , Seng-Yong Lau1 , Ling-Jyh Chen2 , Kun-chan La...
Jyh-How Huang, Po-Yen Lin, Yu-Te Huang, Seng-Yong ...
DSN
2009
IEEE
14 years 4 months ago
On the effectiveness of structural detection and defense against P2P-based botnets
Recently, peer-to-peer (P2P) networks have emerged as a covert communication platform for malicious programs known as bots. As popular distributed systems, they allow bots to comm...
Duc T. Ha, Guanhua Yan, Stephan Eidenbenz, Hung Q....