Sciweavers

54 search results - page 10 / 11
» Capturing collection size for distributed non-cooperative re...
Sort
View
CIKM
2009
Springer
13 years 10 months ago
Heterogeneous cross domain ranking in latent space
Traditional ranking mainly focuses on one type of data source, and effective modeling still relies on a sufficiently large number of labeled or supervised examples. However, in m...
Bo Wang, Jie Tang, Wei Fan, Songcan Chen, Zi Yang,...
WWW
2006
ACM
14 years 6 months ago
FeedEx: collaborative exchange of news feeds
As most blogs and traditional media support RSS or Atom feeds, the news feed technology becomes increasingly prevalent. Taking advantage of ubiquitous news feeds, we design FeedEx...
Seung Jun, Mustaque Ahamad
KDD
2010
ACM
208views Data Mining» more  KDD 2010»
13 years 4 months ago
Towards mobility-based clustering
Identifying hot spots of moving vehicles in an urban area is essential to many smart city applications. The practical research on hot spots in smart city presents many unique feat...
Siyuan Liu, Yunhuai Liu, Lionel M. Ni, Jianping Fa...
SIGMOD
2004
ACM
199views Database» more  SIGMOD 2004»
14 years 5 months ago
Approximate XML Query Answers
The rapid adoption of XML as the standard for data representation and exchange foreshadows a massive increase in the amounts of XML data collected, maintained, and queried over th...
Neoklis Polyzotis, Minos N. Garofalakis, Yannis E....
DRM
2007
Springer
13 years 11 months ago
Mechanism for software tamper resistance: an application of white-box cryptography
In software protection we typically have to deal with the white-box attack model. In this model an attacker is assumed to have full access to the software and full control over it...
Wil Michiels, Paul Gorissen