Sciweavers

161 search results - page 17 / 33
» Transforming general networks into feed-forward by using tur...
Sort
View
SWS
2004
ACM
14 years 5 days ago
Trust but verify: authorization for web services
Through web service technology, distributed applications can be built in a exible manner, bringing tremendous power to applications on the web. However, this exibility poses sig...
Christian Skalka, Xiaoyang Sean Wang
SENSYS
2010
ACM
13 years 4 months ago
Privacy-aware regression modeling of participatory sensing data
Many participatory sensing applications use data collected by participants to construct a public model of a system or phenomenon. For example, a health application might compute a...
Hossein Ahmadi, Nam Pham, Raghu K. Ganti, Tarek F....
KDD
2009
ACM
132views Data Mining» more  KDD 2009»
14 years 7 months ago
Learning patterns in the dynamics of biological networks
Our dynamic graph-based relational mining approach has been developed to learn structural patterns in biological networks as they change over time. The analysis of dynamic network...
Chang Hun You, Lawrence B. Holder, Diane J. Cook
SIGMOD
2010
ACM
217views Database» more  SIGMOD 2010»
13 years 11 months ago
Mining knowledge from databases: an information network analysis approach
Most people consider a database is merely a data repository that supports data storage and retrieval. Actually, a database contains rich, inter-related, multi-typed data and infor...
Jiawei Han, Yizhou Sun, Xifeng Yan, Philip S. Yu
INFOCOM
2005
IEEE
14 years 10 days ago
Design multicast protocols for non-cooperative networks
— Conventionally, most network protocols assume that the network entities who participate in the network activities will always behave as instructed. However, in practice, most n...
Weizhao Wang, Xiang-Yang Li, Zheng Sun, Yu Wang 00...