Sciweavers

521 search results - page 75 / 105
» Mining Mobility Behavior from Trajectory Data
Sort
View
EEMMAS
2007
Springer
14 years 3 months ago
Engineering Contextual Information for Pervasive Multiagent Systems
Multiagent systems for mobile and pervasive computing should extensively exploit contextual information both to adapt to user needs and to enable autonomic behavior. This raises th...
Gabriella Castelli, Marco Mamei, Franco Zambonelli
INFSOF
2008
98views more  INFSOF 2008»
13 years 9 months ago
Engineering contextual knowledge for autonomic pervasive services
Services for mobile and pervasive computing should extensively exploit contextual information both to adapt to user needs and to enable autonomic behavior. This raises the problem...
Gabriella Castelli, Marco Mamei, Franco Zambonelli
ADMA
2008
Springer
240views Data Mining» more  ADMA 2008»
14 years 3 months ago
Automatic Web Tagging and Person Tagging Using Language Models
Abstract. Social bookmarking has become an important web2.0 application recently, which is concerned with the dual user behavior to search - tagging. Although social bookmarking we...
Qiaozhu Mei, Yi Zhang
ICDCSW
2003
IEEE
14 years 2 months ago
Revealing the Retail Black Box by Interaction Sensing
Today a huge variety of methods to track and analyze the customers’ behavior in e-commerce systems is available. However, in traditional retail stores such systems are not widel...
Christian Decker, Uwe Kubach, Michael Beigl
SDM
2007
SIAM
96views Data Mining» more  SDM 2007»
13 years 10 months ago
Understanding and Utilizing the Hierarchy of Abnormal BGP Events
Abnormal events, such as security attacks, misconfigurations, or electricity failures, could have severe consequences toward the normal operation of the Border Gateway Protocol (...
Dejing Dou, Jun Li, Han Qin, Shiwoong Kim, Sheng Z...