Sciweavers

500 search results - page 98 / 100
» The Knowledge Depot: Building and Evaluating a Knowledge Man...
Sort
View
SIGCOMM
2004
ACM
13 years 11 months ago
A wavelet-based approach to detect shared congestion
Per-flow congestion control helps endpoints fairly and efficiently share network resources. Better utilization of network resources can be achieved, however, if congestion manag...
Min Sik Kim, Taekhyun Kim, YongJune Shin, Simon S....
GIS
2008
ACM
14 years 7 months ago
Mining user similarity based on location history
The pervasiveness of location-acquisition technologies (GPS, GSM networks, etc.) enable people to conveniently log the location histories they visited with spatio-temporal data. T...
Quannan Li, Yu Zheng, Xing Xie, Yukun Chen, Wenyu ...
KDD
2007
ACM
154views Data Mining» more  KDD 2007»
14 years 6 months ago
Canonicalization of database records using adaptive similarity measures
It is becoming increasingly common to construct databases from information automatically culled from many heterogeneous sources. For example, a research publication database can b...
Aron Culotta, Michael L. Wick, Robert Hall, Matthe...
SACMAT
2009
ACM
14 years 17 days ago
Symbolic reachability analysis for parameterized administrative role based access control
Role based access control (RBAC) is a widely used access control paradigm. In large organizations, the RBAC policy is managed by multiple administrators. An administrative role ba...
Scott D. Stoller, Ping Yang, Mikhail I. Gofman, C....
AAMAS
1999
Springer
13 years 5 months ago
Fully Embodied Conversational Avatars: Making Communicative Behaviors Autonomous
: Although avatars may resemble communicative interface agents, they have for the most part not profited from recent research into autonomous embodied conversational systems. In pa...
Justine Cassell, Hannes Högni Vilhjálm...