Sciweavers

995 search results - page 182 / 199
» Intrusion ripple analysis in distributed information systems
Sort
View
INFOCOM
2012
IEEE
11 years 9 months ago
Sherlock is around: Detecting network failures with local evidence fusion
—Traditional approaches for wireless sensor network diagnosis are mainly sink-based. They actively collect global evidences from sensor nodes to the sink so as to conduct central...
Qiang Ma, Kebin Liu, Xin Miao, Yunhao Liu
KDD
2012
ACM
217views Data Mining» more  KDD 2012»
11 years 9 months ago
Cross-domain collaboration recommendation
Interdisciplinary collaborations have generated huge impact to society. However, it is often hard for researchers to establish such cross-domain collaborations. What are the patte...
Jie Tang, Sen Wu, Jimeng Sun, Hang Su
MM
2004
ACM
142views Multimedia» more  MM 2004»
14 years 24 days ago
Parsing and browsing tools for colonoscopy videos
Colonoscopy is an important screening tool for colorectal cancer. During a colonoscopic procedure, a tiny video camera at the tip of the endoscope generates a video signal of the ...
Yu Cao, Dalei Li, Wallapak Tavanapong, Jung-Hwan O...
SIGMOD
2010
ACM
250views Database» more  SIGMOD 2010»
14 years 6 days ago
Spreadsheet as a relational database engine
Spreadsheets are among the most commonly used applications for data management and analysis. Perhaps they are even among the most widely used computer applications of all kinds. H...
Jerzy Tyszkiewicz
SIGMOD
2010
ACM
305views Database» more  SIGMOD 2010»
14 years 6 days ago
MoveMine: mining moving object databases
With the maturity of GPS, wireless, and Web technologies, increasing amounts of movement data collected from various moving objects, such as animals, vehicles, mobile devices, and...
Zhenhui Li, Ming Ji, Jae-Gil Lee, Lu An Tang, Yint...