Sciweavers

1888 search results - page 362 / 378
» Proof theory and computational analysis
Sort
View
PETRA
2010
ACM
13 years 5 months ago
Integrating RFID on event-based hemispheric imaging for internet of things assistive applications
Automatic surveillance of a scene in a broad sense comprises one of the core modules of pervasive applications. Typically, multiple cameras are installed in an area to identify ev...
Vassilis Kolias, Ioannis Giannoukos, Christos Anag...
SIGMETRICS
2011
ACM
140views Hardware» more  SIGMETRICS 2011»
12 years 10 months ago
On the stability and optimality of universal swarms
Recent work on BitTorrent swarms has demonstrated that a bandwidth bottleneck at the seed can lead to the underutilization of the aggregate swarm capacity. Bandwidth underutilizat...
Xia Zhou, Stratis Ioannidis, Laurent Massouli&eacu...
KDD
2005
ACM
165views Data Mining» more  KDD 2005»
14 years 7 months ago
Co-clustering by block value decomposition
Dyadic data matrices, such as co-occurrence matrix, rating matrix, and proximity matrix, arise frequently in various important applications. A fundamental problem in dyadic data a...
Bo Long, Zhongfei (Mark) Zhang, Philip S. Yu
ICDT
2010
ACM
211views Database» more  ICDT 2010»
14 years 4 months ago
Probabilistic Data Exchange
The work reported here lays the foundations of data exchange in the presence of probabilistic data. This requires rethinking the very basic concepts of traditional data exchange, ...
Ronald Fagin, Benny Kimelfeld, Phokion Kolaitis
CIKM
2007
Springer
14 years 1 months ago
Query expansion using probabilistic local feedback with application to multimedia retrieval
As one of the most effective query expansion approaches, local feedback is able to automatically discover new query terms and improve retrieval accuracy for different retrieval ...
Rong Yan, Alexander G. Hauptmann