Sciweavers

952 search results - page 26 / 191
» TreeFam: 2008 Update
Sort
View
ICDM
2009
IEEE
105views Data Mining» more  ICDM 2009»
15 years 10 months ago
Multi-document Summarization by Information Distance
—We are now living in a world where information is growing and updating quickly. Knowledge can be acquired more efficiently with the help of automatic document summarization and...
Chong Long, Minlie Huang, Xiaoyan Zhu, Ming Li
132
Voted
ICDCS
2008
IEEE
15 years 10 months ago
Mobile Filtering for Error-Bounded Data Collection in Sensor Networks
In wireless sensor networks, filters, which suppress data update reports within predefined error bounds, effectively reduce the traffic volume for continuous data collection. A...
Dan Wang, Jianliang Xu, Jiangchuan Liu, Feng Wang
121
Voted
IPPS
2008
IEEE
15 years 10 months ago
Junction tree decomposition for parallel exact inference
We present a junction tree decomposition based algorithm for parallel exact inference. This is a novel parallel exact inference method for evidence propagation in an arbitrary jun...
Yinglong Xia, Viktor K. Prasanna
NOMS
2008
IEEE
141views Communications» more  NOMS 2008»
15 years 10 months ago
Detecting BGP anomalies with wavelet
—In this paper, we propose a BGP anomaly detection framework called BAlet that delivers both temporal and spatial localization of the potential anomalies. It requires only a simp...
Jianning Mai, Lihua Yuan, Chen-Nee Chuah
113
Voted
ACNS
2008
Springer
88views Cryptology» more  ACNS 2008»
15 years 9 months ago
On the Effectiveness of Internal Patching Against File-Sharing Worms
File-sharing worms have been terrorizing Peer-to-peer (P2P) systems in recent years. Existing defenses relying on users’ individual recoveries or limiting users’ file-sharing ...
Liang Xie, Hui Song, Sencun Zhu