Sciweavers

1291 search results - page 245 / 259
» Intrusion Detection for Distributed Applications
Sort
View
169
Voted
SIGIR
2012
ACM
13 years 5 months ago
Predicting quality flaws in user-generated content: the case of wikipedia
The detection and improvement of low-quality information is a key concern in Web applications that are based on user-generated content; a popular example is the online encyclopedi...
Maik Anderka, Benno Stein, Nedim Lipka
185
Voted
SDM
2012
SIAM
245views Data Mining» more  SDM 2012»
13 years 5 months ago
Deterministic CUR for Improved Large-Scale Data Analysis: An Empirical Study
Low-rank approximations which are computed from selected rows and columns of a given data matrix have attracted considerable attention lately. They have been proposed as an altern...
Christian Thurau, Kristian Kersting, Christian Bau...
MOBISYS
2009
ACM
16 years 3 months ago
Leakage-aware energy synchronization for wireless sensor networks
To ensure sustainable operations of wireless sensor systems, environmental energy harvesting has been regarded as the right solution for long-term applications. In energy-dynamic ...
Ting Zhu, Ziguo Zhong, Yu Gu, Tian He, Zhi-Li Zhan...
147
Voted
MOBISYS
2009
ACM
16 years 3 months ago
A framework of energy efficient mobile sensing for automatic user state recognition
Urban sensing, participatory sensing, and user activity recognition can provide rich contextual information for mobile applications such as social networking and location-based se...
Yi Wang, Jialiu Lin, Murali Annavaram, Quinn Jacob...
106
Voted
IMC
2009
ACM
15 years 9 months ago
TCP revisited: a fresh look at TCP in the wild
Since the last in-depth studies of measured TCP traffic some 68 years ago, the Internet has experienced significant changes, including the rapid deployment of backbone links wit...
Feng Qian, Alexandre Gerber, Zhuoqing Morley Mao, ...