Sciweavers

2639 search results - page 331 / 528
» Pen Computing: Challenges and Applications
Sort
View
PAKDD
2005
ACM
160views Data Mining» more  PAKDD 2005»
15 years 10 months ago
Improving Mining Quality by Exploiting Data Dependency
The usefulness of the results produced by data mining methods can be critically impaired by several factors such as (1) low quality of data, including errors due to contamination, ...
Fang Chu, Yizhou Wang, Carlo Zaniolo, Douglas Stot...
WLP
2005
Springer
15 years 10 months ago
Expressing Interaction in Combinatorial Auction through Social Integrity Constraints
Abstract. Combinatorial Auctions are an attractive application of intelligent agents; their applications are countless and are shown to provide good revenues. On the other hand, on...
Marco Alberti, Federico Chesani, Alessio Guerri, M...
DOCENG
2004
ACM
15 years 10 months ago
Supporting virtual documents in just-in-time hypermedia systems
Many analytical or computational applications, especially legacy systems, create documents and display screens in response to user queries “dynamically” or in “real time”....
Li Zhang, Michael P. Bieber, David E. Millard, Vin...
MSWIM
2003
ACM
15 years 10 months ago
Randomized location service in mobile ad hoc networks
Mobile Ad-Hoc Networks (MANETS) are networks of mobile nodes that do not have a fixed infrastructure. Recent research in this field addresses ways of solving existing problems i...
Sangeeta Bhattacharya
MM
2009
ACM
249views Multimedia» more  MM 2009»
15 years 9 months ago
MyFinder: near-duplicate detection for large image collections
The explosive growth of multimedia data poses serious challenges to data storage, management and search. Efficient near-duplicate detection is one of the required technologies for...
Xin Yang, Qiang Zhu, Kwang-Ting Cheng