Sciweavers

7581 search results - page 1423 / 1517
» Incompleteness in Data Mining
Sort
View
CCS
2009
ACM
15 years 10 months ago
Finding "hidden" connections on linkedIn an argument for more pragmatic social network privacy
Social networking services well know that some users are unwilling to freely share the information they store with the service (e.g. profile information). To address this, servic...
Jessica Staddon
117
Voted
GLOBECOM
2009
IEEE
15 years 10 months ago
Rapidly-Deployable Mesh Network Testbed
—This paper describes a wireless mesh network testbed for research in rapid deployment and auto-configuration of mesh nodes. Motivated by the needs of first responders and mili...
Michael R. Souryal, Andreas Wapf, Nader Moayeri
ICAC
2009
IEEE
15 years 10 months ago
Out-of-band detection of boot-sequence termination events
The popularization of both virtualization and CDP technologies mean that we can now watch disk accesses of systems from entities which are not controlled by the OS. This is a rich...
Naama Parush, Dan Pelleg, Muli Ben-Yehuda, Paula T...
KBSE
2009
IEEE
15 years 10 months ago
Code Completion from Abbreviated Input
—Abbreviation Completion is a novel technique to improve the efficiency of code-writing by supporting code completion of multiple keywords based on non-predefined abbreviated inp...
Sangmok Han, David R. Wallace, Robert C. Miller
ADMI
2009
Springer
15 years 10 months ago
Concept Learning for Achieving Personalized Ontologies: An Active Learning Approach
In many multiagent approaches, it is usual to assume the existence of a common ontology among agents. However, in dynamic systems, the existence of such an ontology is unrealistic ...
Murat Sensoy, Pinar Yolum
« Prev « First page 1423 / 1517 Last » Next »