Sciweavers

145 search results - page 29 / 29
» External Uniqueness Is Unique Enough
Sort
View
CORR
2010
Springer
160views Education» more  CORR 2010»
13 years 5 months ago
A Semi-distributed Reputation Based Intrusion Detection System for Mobile Adhoc Networks
Abstract: A Mobile Adhoc Network (manet) is a cooperative engagement of a collection of mobile nodes without any centralized access point. The underlying concept of coordination am...
Animesh Kr Trivedi, Rajan Arora, Rishi Kapoor, Sud...
ICDE
2010
IEEE
220views Database» more  ICDE 2010»
13 years 3 months ago
Profiling linked open data with ProLOD
Linked open data (LOD), as provided by a quickly growing number of sources constitutes a wealth of easily accessible information. However, this data is not easy to understand. It i...
Christoph Böhm, Felix Naumann, Ziawasch Abedj...
ICDM
2010
IEEE
201views Data Mining» more  ICDM 2010»
13 years 3 months ago
Mining Closed Strict Episodes
Discovering patterns in a sequence is an important aspect of data mining. One popular choice of such patterns are episodes, patterns in sequential data describing events that often...
Nikolaj Tatti, Boris Cule
CNSR
2011
IEEE
238views Communications» more  CNSR 2011»
12 years 9 months ago
Measurement Study on PPLive Based on Channel Popularity
Abstract—In recent years, Peer-to-Peer (P2P) streaming systems experienced tremendous growth and became one of the largest bandwidth consumer on Internet. PPLive, one of the most...
Ruixuan Li, Guoqiang Gao, Weijun Xiao, Zhiyong Xu
LACL
2011
Springer
12 years 8 months ago
Using Logic in the Generation of Referring Expressions
The problem of generating referring expressions (GRE) is an important task in natural language generation. In this paper, we advocate for the use of logical languages in the output...
Carlos Areces, Santiago Figueira, Daniel Gor&iacut...