Sciweavers

487 search results - page 87 / 98
» Personal Information Management (PIM) for Intelligence Analy...
Sort
View
MOBIHOC
2005
ACM
14 years 7 months ago
Low-coordination topologies for redundancy in sensor networks
Tiny, low-cost sensor devices are expected to be failure-prone and hence in many realistic deployment scenarios for sensor networks these nodes are deployed in higher than necessa...
Rajagopal Iyengar, Koushik Kar, Suman Banerjee
SIGIR
2005
ACM
14 years 1 months ago
An application of text categorization methods to gene ontology annotation
This paper describes an application of IR and text categorization methods to a highly practical problem in biomedicine, specifically, Gene Ontology (GO) annotation. GO annotation...
Kazuhiro Seki, Javed Mostafa
SIGMETRICS
2003
ACM
101views Hardware» more  SIGMETRICS 2003»
14 years 22 days ago
Effects of clock resolution on the scheduling of interactive and soft real-time processes
It is commonly agreed that scheduling mechanisms in general purpose operating systems do not provide adequate support for modern interactive applications, notably multimedia appli...
Yoav Etsion, Dan Tsafrir, Dror G. Feitelson
DAMON
2008
Springer
13 years 9 months ago
CAM conscious integrated answering of frequent elements and top-k queries over data streams
Frequent elements and top-k queries constitute an important class of queries for data stream analysis applications. Certain applications require answers for both frequent elements...
Sudipto Das, Divyakant Agrawal, Amr El Abbadi
CCS
2011
ACM
12 years 7 months ago
Automatic error finding in access-control policies
Verifying that access-control systems maintain desired security properties is recognized as an important problem in security. Enterprise access-control systems have grown to prote...
Karthick Jayaraman, Vijay Ganesh, Mahesh V. Tripun...