Sciweavers

2648 search results - page 224 / 530
» Challenges for Network Computer Games
Sort
View
PKDD
2010
Springer
128views Data Mining» more  PKDD 2010»
15 years 2 months ago
Learning to Tag from Open Vocabulary Labels
Most approaches to classifying media content assume a fixed, closed vocabulary of labels. In contrast, we advocate machine learning approaches which take advantage of the millions...
Edith Law, Burr Settles, Tom M. Mitchell
130
Voted
WICON
2008
15 years 5 months ago
Exploiting parallel networks using dynamic channel scheduling
Many researchers have been focusing on the outcomes and consequences of the rapid increase and proliferation of mobile wireless technologies. If it is not already the case, it wil...
Lara B. Deek, Kevin C. Almeroth, Mike P. Wittie, K...
141
Voted
IMC
2009
ACM
15 years 10 months ago
Scalable proximity estimation and link prediction in online social networks
Proximity measures quantify the closeness or similarity between nodes in a social network and form the basis of a range of applications in social sciences, business, information t...
Han Hee Song, Tae Won Cho, Vacha Dave, Yin Zhang, ...
129
Voted
DSN
2008
IEEE
15 years 10 months ago
International Workshop on Resilience Assessment and Dependability Benchmarking (RADB 2008)
This workshop summary gives a brief overview of the workshop on “Resilience Assessment and Dependability Benchmarking” held in conjunction with the 38th IEEE/IFIP Internationa...
Andrea Bondavalli, István Majzik, Aad P. A....
142
Voted
CIS
2008
Springer
15 years 5 months ago
A Near-Optimal Redundancy Allocation Strategy that Minimizes a System's Vulnerability to Hazardous Events and Malicious Attacks
Delivering continuous services in information infrastructures is a major challenge. For system or network administrators, redundancy allocation is one of the best strategies to en...
Frank Yeong-Sung Lin, Po-Hao Tsang, Kun-Dao Jiang