Sciweavers

15379 search results - page 2945 / 3076
» Protecting users from
Sort
View
ICDM
2007
IEEE
149views Data Mining» more  ICDM 2007»
15 years 10 months ago
Non-redundant Multi-view Clustering via Orthogonalization
Typical clustering algorithms output a single clustering of the data. However, in real world applications, data can often be interpreted in many different ways; data can have diff...
Ying Cui, Xiaoli Z. Fern, Jennifer G. Dy
186
Voted
ICSNC
2007
IEEE
15 years 10 months ago
Movement Prediction Using Bayesian Learning for Neural Networks
Nowadays, path prediction is being extensively examined for use in the context of mobile and wireless computing towards more efficient network resource management schemes. Path pr...
Sherif Akoush, Ahmed Sameh
IEEESCC
2007
IEEE
15 years 10 months ago
Exchanging Policies between Web Service Entities using Rule Languages
Web rule languages with the ability to cover various types of rules have been recently emerged to make interactions between web resources and broker agents possible. The chance of...
Nima Kaviani, Dragan Gasevic, Marek Hatala, Gerd W...
109
Voted
INFOCOM
2007
IEEE
15 years 10 months ago
Analysis of the Reliability of a Nationwide Short Message Service
—SMS has been arguably the most popular wireless data service for cellular networks. Due to its ubiquitous availability and universal support by mobile handsets and cellular carr...
Xiaoqiao Meng, Petros Zerfos, Vidyut Samanta, Star...
IPPS
2007
IEEE
15 years 10 months ago
A Semi-Distributed Axiomatic Game Theoretical Mechanism for Replicating Data Objects in Large Distributed Computing Systems
Replicating data objects onto servers across a system can alleviate access delays. The selection of data objects and servers requires solving a constraint optimization problem, wh...
Samee Ullah Khan, Ishfaq Ahmad
« Prev « First page 2945 / 3076 Last » Next »