Sciweavers

3506 search results - page 677 / 702
» Pattern recognition in information systems
Sort
View
CCS
2007
ACM
14 years 3 months ago
Filtering spam with behavioral blacklisting
Spam filters often use the reputation of an IP address (or IP address range) to classify email senders. This approach worked well when most spam originated from senders with fix...
Anirudh Ramachandran, Nick Feamster, Santosh Vempa...
WWW
2008
ACM
14 years 9 months ago
Tag-based social interest discovery
The success and popularity of social network systems, such as del.icio.us, Facebook, MySpace, and YouTube, have generated many interesting and challenging problems to the research...
Xin Li, Lei Guo, Yihong Eric Zhao
CHI
2009
ACM
14 years 9 months ago
Mirroring bodily experiences over time
Elsa Kosmack Vaara Kristina H??k The Affective Health system is a mobile lifestyle application that aims to empower people to reflect on their lives and lifestyles. The system logs...
Elsa Kosmack Vaara, Jakob Tholander, Kristina H&ou...
MOBIHOC
2004
ACM
14 years 8 months ago
Internal synchronization of drift-constraint clocks in ad-hoc sensor networks
Clock synchronization is a crucial basic service in typical sensor networks, since the observations of distributed sensors more often than not need to be ordered ("a happened...
Lennart Meier, Philipp Blum, Lothar Thiele
MOBIQUITOUS
2008
IEEE
14 years 3 months ago
Context-aware fault tolerance in migratory services
Mobile ad hoc networks can be leveraged to provide ubiquitous services capable of acquiring, processing, and sharing real-time information from the physical world. Unlike Internet...
Oriana Riva, Josiane Nzouonta, Cristian Borcea