Sciweavers

463 search results - page 81 / 93
» Method Tailoring as Negotiation
Sort
View
KDD
2005
ACM
146views Data Mining» more  KDD 2005»
14 years 10 months ago
Anonymity-preserving data collection
Protection of privacy has become an important problem in data mining. In particular, individuals have become increasingly unwilling to share their data, frequently resulting in in...
Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright
JCDL
2009
ACM
133views Education» more  JCDL 2009»
14 years 4 months ago
Cost and benefit analysis of mediated enterprise search
The utility of an enterprise search system is determined by three key players: the information retrieval (IR) system (the search engine), the enterprise users, and the service pro...
Mingfang Wu, James A. Thom, Andrew Turpin, Ross Wi...
MOBICOM
2009
ACM
14 years 4 months ago
Opportunistic flooding in low-duty-cycle wireless sensor networks with unreliable links
Intended for network-wide dissemination of commands, configurations and code binaries, flooding has been investigated extensively in wireless networks. However, little work has ...
Shuo Guo, Yu Gu, Bo Jiang, Tian He
HIKM
2006
ACM
14 years 3 months ago
Epoch: an ontological framework to support clinical trials management
The increasing complexity of clinical trials has generated an enormous requirement for knowledge and information specification at all stages of the trials, including planning, doc...
Ravi D. Shankar, Susana B. Martins, Martin J. O'Co...
MIR
2005
ACM
141views Multimedia» more  MIR 2005»
14 years 3 months ago
A mutual semantic endorsement approach to image retrieval and context provision
Learning semantics from annotated images to enhance content-based retrieval is an important research direction. In this paper, annotation data are assumed available for only a sub...
Jia Li