Sciweavers

1976 search results - page 332 / 396
» Predictive Graph Mining
Sort
View
CCS
2007
ACM
14 years 3 months ago
Analyzing the vulnerability of superpeer networks against attack
In this paper, we develop an analytical framework to measure the vulnerability of superpeer networks against attack. Two different kinds of attacks namely deterministic and degre...
Bivas Mitra, Fernando Peruani, Sujoy Ghose, Niloy ...
ISWC
2003
IEEE
14 years 2 months ago
Unsupervised, Dynamic Identification of Physiological and Activity Context in Wearable Computing
Context-aware computing describes the situation where a wearable / mobile computer is aware of its user’s state and surroundings and modifies its behavior based on this informat...
Andreas Krause, Daniel P. Siewiorek, Asim Smailagi...
ISSTA
2000
ACM
14 years 1 months ago
OMEN: A strategy for testing object-oriented software
This paper presents a strategy for structural testing of objectoriented software systems with possibly unknown clients and unknown information about invoked methods. By exploiting...
Amie L. Souter, Lori L. Pollock
CCGRID
2008
IEEE
13 years 10 months ago
Scheduling Dynamic Workflows onto Clusters of Clusters using Postponing
In this article, we revisit the problem of scheduling dynamically generated directed acyclic graphs (DAGs) of multi-processor tasks (M-tasks). A DAG is a basic model for expressin...
Sascha Hunold, Thomas Rauber, Frédér...
CEAS
2008
Springer
13 years 10 months ago
Activity-centred Search in Email
We consider activity-centered tasks in email, including the novel task of predicting future involvement of persons from an enterprise in an ongoing activity represented by a folde...
Einat Minkov, Ramnath Balasubramanyan, William W. ...