Sciweavers

317 search results - page 34 / 64
» Who gives a tweet
Sort
View
VLDB
2004
ACM
245views Database» more  VLDB 2004»
14 years 2 months ago
VizTree: a Tool for Visually Mining and Monitoring Massive Time Series Databases
Moments before the launch of every space vehicle, engineering discipline specialists must make a critical go/no-go decision. The cost of a false positive, allowing a launch in spi...
Jessica Lin, Eamonn J. Keogh, Stefano Lonardi, Jef...
NDSS
2003
IEEE
14 years 2 months ago
Fighting Spam by Encapsulating Policy in Email Addresses
Everyday network interactions require users to give out their email address, yet no guarantees can be made about how this address will be used. Sometimes the address is given to a...
John Ioannidis
IEEEMSP
2002
IEEE
177views Multimedia» more  IEEEMSP 2002»
14 years 1 months ago
Data masking: a secure-covert channel paradigm
— It is well known that encryption provides secure channels for communicating entities. However, due to lack of covertness on these channels, an eavesdropper can identify encrypt...
Regunathan Radhakrishnan, Kulesh Shanmugasundaram,...
SIGECOM
2010
ACM
152views ECommerce» more  SIGECOM 2010»
14 years 1 months ago
Information aggregation in smooth markets
Recent years have seen extensive investigation of the information aggregation properties of prediction markets. However, relatively little is known about conditions under which a ...
Krishnamurthy Iyer, Ramesh Johari, Ciamac Cyrus Mo...
ICLP
2009
Springer
14 years 1 months ago
Integration of Abductive Reasoning and Constraint Optimization in SCIFF
Abstract. Abductive Logic Programming (ALP) and Constraint Logic Programming (CLP) share the feature to constrain the set of possible solutions to a program via integrity or CLP co...
Marco Gavanelli, Marco Alberti, Evelina Lamma