Sciweavers

1056 search results - page 121 / 212
» Identifying and Exploiting Ultrametricity
Sort
View
NSPW
2006
ACM
14 years 4 months ago
Dark application communities
In considering new security paradigms, it is often worthwhile to anticipate the direction and nature of future attack paradigms. We identify a class of attacks based on the idea o...
Michael E. Locasto, Angelos Stavrou, Angelos D. Ke...
SIGIR
2006
ACM
14 years 4 months ago
Latent semantic analysis for multiple-type interrelated data objects
Co-occurrence data is quite common in many real applications. Latent Semantic Analysis (LSA) has been successfully used to identify semantic relations in such data. However, LSA c...
Xuanhui Wang, Jian-Tao Sun, Zheng Chen, ChengXiang...
WIDM
2006
ACM
14 years 4 months ago
The GEON portal: accelerating knowledge discovery in the geosciences
Geoscience studies produce data from various observations, experiments, and simulations at an enormous rate. With proliferation of applications and data formats, the geoscience re...
Ullas Nambiar, Bertram Ludäscher, Kai Lin, Ch...
DSRT
2005
IEEE
14 years 3 months ago
Exploring the Use of Local Consistency Measures as Thresholds for Dead Reckoning Update Packet Generation
Human-to-human interaction across distributed applications requires that sufficient consistency be maintained among participants in the face of network characteristics such as lat...
David J. Roberts, Damien Marshall, Rob Aspin, S&ea...
ICDM
2005
IEEE
272views Data Mining» more  ICDM 2005»
14 years 3 months ago
Mining Patterns of Change in Remote Sensing Image Databases
Remote sensing image databases are the fastest growing archives of spatial information. However, we still have a limited capacity for extracting information from large remote sens...
Marcelino Pereira dos Santos Silva, Gilberto C&aci...