Sciweavers

11 search results - page 1 / 3
» Discovering Characteristic Individual Accessing Behaviors in...
Sort
View
RSFDGRC
2005
Springer
112views Data Mining» more  RSFDGRC 2005»
13 years 10 months ago
Discovering Characteristic Individual Accessing Behaviors in Web Environment
Abstract. Discovering diverse individual accessing behaviors in web environment is required before mining the valuable patterns from behaviors of groups of visitors. In this paper,...
Long Wang 0002, Christoph Meinel, Chunnian Liu
EDBT
2002
ACM
159views Database» more  EDBT 2002»
14 years 4 months ago
Cut-and-Pick Transactions for Proxy Log Mining
Web logs collected by proxy servers, referred to as proxy logs or proxy traces, contain information about Web document accesses by many users against many Web sites. This "man...
Wenwu Lou, Guimei Liu, Hongjun Lu, Qiang Yang
IJWIS
2006
126views more  IJWIS 2006»
13 years 4 months ago
Web services on embedded devices
Abstract-- The capabilities of embedded devices such as smartphones are steadily increasing and provide the great flexibility of data access and collaboration while being mobile. F...
Daniel Schall, Marco Aiello, Schahram Dustdar
ICALT
2008
IEEE
13 years 11 months ago
NOESIS: An Enhanced Educational Environment for Kids with Autism Spectrum Disorders
A novel educational environment for kids with autistic spectrum disorders (ASDs), namely NOESIS, is presented in this paper. NOESIS takes into account ASD kids’ individual chara...
Iason Vittorias, Panagiotis Petrantonakis, Dimitri...
ICDCS
2002
IEEE
13 years 9 months ago
Query Optimization to Meet Performance Targets for Wide Area Applications
Recent technology advances have enabled mediated query processing with Internet accessible WebSources. A characteristic of WebSources is that their access costs exhibit transient ...
Vladimir Zadorozhny, Louiqa Raschid