Sciweavers

858 search results - page 14 / 172
» One Is Enough!
Sort
View
CCS
1998
ACM
14 years 1 months ago
The Design, Implementation and Operation of an Email Pseudonym Server
Attacks on servers that provide anonymity generally fall into two categories: attempts to expose anonymous users and attempts to silence them. Much existing work concentrates on w...
David Mazières, M. Frans Kaashoek
ESA
2006
Springer
130views Algorithms» more  ESA 2006»
14 years 14 days ago
Reporting Flock Patterns
Data representing moving objects is rapidly getting more available, especially in the area of wildlife GPS tracking. It is a central belief that information is hidden in large data...
Marc Benkert, Joachim Gudmundsson, Florian Hü...
SIGMOD
2006
ACM
131views Database» more  SIGMOD 2006»
14 years 9 months ago
An automatic construction and organization strategy for ensemble learning on data streams
As data streams are gaining prominence in a growing number of emerging application domains, classification on data streams is becoming an active research area. Currently, the typi...
Yi Zhang, Xiaoming Jin
WWW
2011
ACM
13 years 3 months ago
Network bucket testing
Bucket testing, also known as A/B testing, is a practice that is widely used by on-line sites with large audiences: in a simple version of the methodology, one evaluates a new fea...
Lars Backstrom, Jon M. Kleinberg
SASO
2008
IEEE
14 years 3 months ago
Autonomic Resource Management through Self-Organising Agent Communities
In this paper, we analyse how autonomic resource management can be achieved within a system that lacks centralized information about current system demand and the state of system ...
Mariusz Jacyno, Seth Bullock, Terry R. Payne, Nick...