Sciweavers

121 search results - page 23 / 25
» Veracity radius: capturing the locality of distributed compu...
Sort
View
IMC
2009
ACM
14 years 2 months ago
Modeling user activities in a large IPTV system
Internet Protocol Television (IPTV) has emerged as a new delivery method for TV. In contrast with native broadcast in traditional cable and satellite TV system, video streams in I...
Tongqing Qiu, Zihui Ge, Seungjoon Lee, Jia Wang, J...
EDBT
2009
ACM
113views Database» more  EDBT 2009»
14 years 2 months ago
Type-based categorization of relational attributes
In this work we concentrate on categorization of relational attributes based on their data type. Assuming that attribute type/characteristics are unknown or unidentifiable, we an...
Babak Ahmadi, Marios Hadjieleftheriou, Thomas Seid...
KDD
2002
ACM
170views Data Mining» more  KDD 2002»
14 years 7 months ago
Enhanced word clustering for hierarchical text classification
In this paper we propose a new information-theoretic divisive algorithm for word clustering applied to text classification. In previous work, such "distributional clustering&...
Inderjit S. Dhillon, Subramanyam Mallela, Rahul Ku...
TIP
2010
205views more  TIP 2010»
13 years 2 months ago
Variational Region-Based Segmentation Using Multiple Texture Statistics
This paper addresses variational supervised texture segmentation. The main contributions are twofold. First, the proposed method circumvents a major problem related to classical t...
Imen Karoui, Ronan Fablet, Jean-Marc Boucher, Jean...
GRID
2005
Springer
14 years 1 months ago
Adaptive trust negotiation and access control for grids
— Access control in computational grids is typically provided by a combination of identity certificates and local accounts. This approach does not scale as the number of users a...
Tatyana Ryutov, Li Zhou, B. Clifford Neuman, Noria...