Sciweavers

60 search results - page 11 / 12
» Tackling the Provenance Challenge one layer at a time
Sort
View
SAC
2010
ACM
14 years 2 months ago
Coverage-hole trap model in target tracking using distributed relay-robot network
Target tracking is an important issue in wireless sensor network applications. In this paper, we design a Coverage-Hole Trap Model (CTM) based on a system that contains one moving...
Huawei Miao, Chia-Ching Ooi, Xiaowen Wu, Christian...
KDD
2010
ACM
188views Data Mining» more  KDD 2010»
13 years 9 months ago
Inferring networks of diffusion and influence
Information diffusion and virus propagation are fundamental processes talking place in networks. While it is often possible to directly observe when nodes become infected, observi...
Manuel Gomez-Rodriguez, Jure Leskovec, Andreas Kra...
CGF
2010
146views more  CGF 2010»
13 years 8 months ago
Pathline: A Tool For Comparative Functional Genomics
Biologists pioneering the new field of comparative functional genomics attempt to infer the mechanisms of gene regulation by looking for similarities and differences of gene activ...
Miriah D. Meyer, Bang Wong, Mark P. Styczynski, Ta...
ITIIS
2010
137views more  ITIIS 2010»
13 years 6 months ago
Improving the Availability of Scalable on-demand Streams by Dynamic Buffering on P2P Networks
In peer-to-peer (P2P) on-demand streaming networks, the alleviation of server load depends on reciprocal stream sharing among peers. In general, on-demand video services enable cl...
Chow-Sing Lin
PR
2008
328views more  PR 2008»
13 years 7 months ago
Activity based surveillance video content modelling
This paper tackles the problem of surveillance video content modelling. Given a set of surveillance videos, the aims of our work are twofold: firstly a continuous video is segment...
Tao Xiang, Shaogang Gong