This paper focuses on spam blog (splog) detection. Blogs are highly popular, new media social communication mechanisms and splogs corrupt blog search results as well as waste netw...
Yu-Ru Lin, Hari Sundaram, Yun Chi, Jun'ichi Tatemu...
An important objective of wireless sensor networks (WSNs) is to reliably sense data about the environment in which they are deployed. Reliability in WSNs has been widely studied in...
This paper introduces a new representation for describing routine tasks, called temporal task footprints. Routines are characterized by their temporal regularity or rhythm. Tempor...
Oliver Brdiczka, Norman Makoto Su, James Bo Begole
—The bitmap obtained by scanning a printed pattern depends on the exact location of the scanning grid relative to the pattern. We consider ideal sampling with a regular lattice o...
Prateek Sarkar, George Nagy, Jiangying Zhou, Danie...
In the pattern matching problem, there can be a quadratic number of matching substrings in the size of a given text. The linearizing restriction finds, at most, a linear number of...