Sciweavers

1790 search results - page 285 / 358
» Automatic Keyword Extraction Using Domain Knowledge
Sort
View
SIGMOD
2012
ACM
242views Database» more  SIGMOD 2012»
13 years 4 months ago
Dynamic management of resources and workloads for RDBMS in cloud: a control-theoretic approach
As cloud computing environments become explosively popular, dealing with unpredictable changes, uncertainties, and disturbances in both systems and environments turns out to be on...
Pengcheng Xiong
VR
2008
IEEE
202views Virtual Reality» more  VR 2008»
15 years 2 months ago
FARMTASIA: an online game-based learning environment based on the VISOLE pedagogy
Virtual interactive student-oriented learning environment (VISOLE) is a game-based constructivist pedagogical approach that encompasses the creation of an online interactive world ...
Kevin K. F. Cheung, Morris Siu Yung Jong, Fong Lok...
ISCAPDCS
2007
15 years 3 months ago
Architectural requirements of parallel computational biology applications with explicit instruction level parallelism
—The tremendous growth in the information culture, efficient digital searches are needed to extract and identify information from huge data. The notion that evolution in silicon ...
Naeem Zafar Azeemi
SIGSOFT
2006
ACM
16 years 3 months ago
Local analysis of atomicity sphere for B2B collaboration
Atomicity is a desirable property for business processes to conduct transactions in Business-to-Business (B2B) collaboration. Although it is possible to reason about atomicity of ...
Chunyang Ye, S. C. Cheung, W. K. Chan, Chang Xu
99
Voted
KDD
2005
ACM
158views Data Mining» more  KDD 2005»
16 years 2 months ago
Adversarial learning
Many classification tasks, such as spam filtering, intrusion detection, and terrorism detection, are complicated by an adversary who wishes to avoid detection. Previous work on ad...
Daniel Lowd, Christopher Meek