Sciweavers

6249 search results - page 1191 / 1250
» Topological Informational Spaces
Sort
View
KDD
2009
ACM
181views Data Mining» more  KDD 2009»
14 years 3 months ago
An exploration of climate data using complex networks
To discover patterns in historical data, climate scientists have applied various clustering methods with the goal of identifying regions that share some common climatological beha...
Karsten Steinhaeuser, Nitesh V. Chawla, Auroop R. ...
INFOCOM
2009
IEEE
14 years 3 months ago
Fighting Spam with the NeighborhoodWatch DHT
—In this paper, we present DHTBL, an anti-spam blacklist built upon a novel secure distributed hash table (DHT). We show how DHTBL can be used to replace existing DNS-based black...
Adam Bender, Rob Sherwood, Derek Monner, Nathan Go...
CIKM
2009
Springer
14 years 3 months ago
Bitmap indexes for relational XML twig query processing
Due to an increasing volume of XML data, it is considered prudent to store XML data on an industry-strength database system instead of relying on a domain specific application or...
Kyong-Ha Lee, Bongki Moon
ECOWS
2009
Springer
14 years 3 months ago
Indirect Reciprocity in Policy-Based Helping Experiments
—In service-oriented architectures, participants keep interacting by exchanging tasks, in order to increase their benefit. Since carrying out a task incurs costs, and participan...
Christian von der Weth, Klemens Böhm, Thorben...
FSTTCS
2009
Springer
14 years 3 months ago
Functionally Private Approximations of Negligibly-Biased Estimators
ABSTRACT. We study functionally private approximations. An approximation function g is functionally private with respect to f if, for any input x, g(x) reveals no more information ...
André Madeira, S. Muthukrishnan
« Prev « First page 1191 / 1250 Last » Next »