Sciweavers

15251 search results - page 2699 / 3051
» Network Science - Theory and Application
Sort
View
CODASPY
2011
14 years 8 months ago
Privacy-preserving activity scheduling on mobile devices
—Progress in mobile wireless technology has resulted in the increased use of mobile devices to store and manage users’ personal schedules. Users also access popular contextbase...
Igor Bilogrevic, Murtuza Jadliwala, Jean-Pierre Hu...
EDBT
2011
ACM
225views Database» more  EDBT 2011»
14 years 8 months ago
SeMiTri: a framework for semantic annotation of heterogeneous trajectories
GPS devices allow recording the movement track of the moving object they are attached to. This data typically consists of a stream of spatio-temporal (x,y,t) points. For applicati...
Zhixian Yan, Dipanjan Chakraborty, Christine Paren...
PPSN
1990
Springer
15 years 8 months ago
Feature Construction for Back-Propagation
T h e ease of learning concepts f r o m examples in empirical machine learning depends on the attributes used for describing the training d a t a . We show t h a t decision-tree b...
Selwyn Piramuthu
171
Voted
WWW
2008
ACM
16 years 5 months ago
Restful web services vs. "big"' web services: making the right architectural decision
Recent technology trends in the Web Services (WS) domain indicate that a solution eliminating the presumed complexity of the WS-* standards may be in sight: advocates of REpresent...
Cesare Pautasso, Olaf Zimmermann, Frank Leymann
WWW
2003
ACM
16 years 5 months ago
P2Cast: peer-to-peer patching scheme for VoD service
Providing video on demand (VoD) service over the Internet in a scalable way is a challenging problem. In this paper, we propose P2Cast - an architecture that uses a peer-to-peer a...
Yang Guo, Kyoungwon Suh, James F. Kurose, Donald F...
« Prev « First page 2699 / 3051 Last » Next »