Sciweavers

1020 search results - page 143 / 204
» Cascade Evaluation of Clustering Algorithms
Sort
View
CIKM
2006
Springer
15 years 3 months ago
A fast and robust method for web page template detection and removal
The widespread use of templates on the Web is considered harmful for two main reasons. Not only do they compromise the relevance judgment of many web IR and web mining methods suc...
Karane Vieira, Altigran Soares da Silva, Nick Pint...
ISCAPDCS
2004
15 years 1 months ago
A VFSA Scheduler for Radiative Transfer Data in Climate Models
Scheduling and load-balancing techniques play an integral role in reducing the overall execution time of scientific applications on clustered multi-node systems. The increasing co...
S. P. Muszala, Gita Alaghband, Daniel A. Connors, ...
CLEF
2010
Springer
15 years 28 days ago
Web Person Name Disambiguation by Relevance Weighting of Extended Feature Sets
Abstract. This paper describes our approach to the Person Name Disambiguation clustering task in the Third Web People Search Evaluation Campaign(WePS3). The method focuses on two a...
Chong Long, Lei Shi
PERVASIVE
2008
Springer
14 years 11 months ago
AnonySense: Opportunistic and Privacy-Preserving Context Collection
Opportunistic sensing allows applications to "task" mobile devices to measure context in a target region. For example, one could leverage sensorequipped vehicles to measu...
Apu Kapadia, Nikos Triandopoulos, Cory Cornelius, ...
CLUSTER
1999
IEEE
14 years 11 months ago
Experimental measurements and design guidelines for real-time software encryption in multimedia wireless LANs
To secure interactive multimedia applications in wireless LANs WLANs it is pertinent to implement real time cryptographic services. In this paper we evaluate the use of software b...
Aura Ganz, Se Hyun Park, Zvi Ganz