Sciweavers

1051 search results - page 130 / 211
» Analyzing Resource Behavior Using Process Mining
Sort
View
KDD
2008
ACM
202views Data Mining» more  KDD 2008»
16 years 1 months ago
Data and Structural k-Anonymity in Social Networks
The advent of social network sites in the last years seems to be a trend that will likely continue. What naive technology users may not realize is that the information they provide...
Alina Campan, Traian Marius Truta
SAC
2011
ACM
14 years 3 months ago
Towards discovering criminal communities from textual data
In many criminal cases, forensically collected data contain valuable information about a suspect’s social networks. An investigator often has to manually extract information fro...
Rabeah Al-Zaidy, Benjamin C. M. Fung, Amr M. Youss...
101
Voted
HT
2007
ACM
15 years 4 months ago
Towards better understanding of folksonomic patterns
Folksonomies provide a free source of keywords describing web resources; however, these keywords are free form and their semantics spans multiple contextual dimension. In this pap...
Hend S. Al-Khalifa, Hugh C. Davis
ICASSP
2011
IEEE
14 years 4 months ago
Blind channel estimation for MPSK-based amplify-and-forward two-way relaying
We consider the problem of channel estimation for amplify-andforward (AF) two-way relay networks (TWRNs). The majority of works on this problem develop pilot-based algorithms that...
Saeed Abdallah, Ioannis N. Psaromiligkos
147
Voted
HIPEAC
2009
Springer
15 years 7 months ago
Predictive Runtime Code Scheduling for Heterogeneous Architectures
Heterogeneous architectures are currently widespread. With the advent of easy-to-program general purpose GPUs, virtually every recent desktop computer is a heterogeneous system. Co...
Víctor J. Jiménez, Lluís Vila...