Sciweavers

1856 search results - page 326 / 372
» Phoning it in
Sort
View
SIGMOD
2004
ACM
151views Database» more  SIGMOD 2004»
14 years 9 months ago
Highly-Available, Fault-Tolerant, Parallel Dataflows
We present a technique that masks failures in a cluster to provide high availability and fault-tolerance for long-running, parallelized dataflows. We can use these dataflows to im...
Mehul A. Shah, Joseph M. Hellerstein, Eric A. Brew...
EDBT
2006
ACM
179views Database» more  EDBT 2006»
14 years 9 months ago
TrajPattern: Mining Sequential Patterns from Imprecise Trajectories of Mobile Objects
Abstract. Mobile objects have become ubiquitous in our everyday lives, ranging from cellular phones to sensors, therefore, analyzing and mining mobile data becomes an interesting p...
Jiong Yang, Meng Hu
EDBT
2008
ACM
128views Database» more  EDBT 2008»
14 years 9 months ago
Processing transitive nearest-neighbor queries in multi-channel access environments
Wireless broadcast is an efficient way for information dissemination due to its good scalability [10]. Existing works typically assume mobile devices, such as cell phones and PDAs...
Xiao Zhang, Wang-Chien Lee, Prasenjit Mitra, Baihu...
EDBT
2008
ACM
166views Database» more  EDBT 2008»
14 years 9 months ago
Social ties and their relevance to churn in mobile telecom networks
Social Network Analysis has emerged as a key paradigm in modern sociology, technology, and information sciences. The paradigm stems from the view that the attributes of an individ...
Koustuv Dasgupta, Rahul Singh, Balaji Viswanathan,...
CIVR
2009
Springer
583views Image Analysis» more  CIVR 2009»
14 years 9 months ago
Mining from Large Image Sets
So far, most image mining was based on interactive querying. Although such querying will remain important in the future, several applications need image mining at such wide scale...
Luc J. Van Gool, Michael D. Breitenstein, Stephan ...