Sciweavers

10577 search results - page 2115 / 2116
» Active Data Mining
Sort
View
SIGCOMM
2012
ACM
11 years 8 months ago
Measuring and fingerprinting click-spam in ad networks
Advertising plays a vital role in supporting free websites and smartphone apps. Click-spam, i.e., fraudulent or invalid clicks on online ads where the user has no actual interest ...
Vacha Dave, Saikat Guha, Yin Zhang
INFOCOM
2012
IEEE
11 years 8 months ago
Realizing the full potential of PSM using proxying
Abstract—The WiFi radio in smartphones consumes a significant portion of energy when active. To reduce the energy consumption, the Power Saving Mode was standardized in IEEE 802...
Ning Ding, Abhinav Pathak, Dimitrios Koutsonikolas...
TOG
2012
232views Communications» more  TOG 2012»
11 years 8 months ago
Discovery of complex behaviors through contact-invariant optimization
We present a motion synthesis framework capable of producing a wide variety of important human behaviors that have rarely been studied, including getting up from the ground, crawl...
Igor Mordatch, Emanuel Todorov, Zoran Popovic
NAR
1998
70views more  NAR 1998»
13 years 5 months ago
Haemophilia B: database of point mutations and short additions and deletions--eighth edition
The eighth edition of the haemophilia B database (http://www.umds.ac.uk/molgen/haemBdatabase.htm ) lists in an easily accessible form all known factor IX mutations due to small ch...
F. Giannelli, P. M. Green, S. S. Sommer, M.-C. Poo...
ICC
2007
IEEE
186views Communications» more  ICC 2007»
14 years 15 days ago
An Efficient Cluster-Based Proactive Secret Share Update Scheme for Mobile Ad Hoc Networks
– When implementing public key security ser- easy for an adversary to collect data and attack. To solve this vices in mobile ad hoc networks (MANETs), multiple problem, the distr...
Ying Dong, Ai Fen Sui, Siu-Ming Yiu, Victor O. K. ...
« Prev « First page 2115 / 2116 Last » Next »