Sciweavers

5948 search results - page 1000 / 1190
» Computing Robust Counter-Strategies
Sort
View
111
Voted
ICDM
2008
IEEE
102views Data Mining» more  ICDM 2008»
15 years 10 months ago
Mining Order-Preserving Submatrices from Data with Repeated Measurements
Order-preserving submatrices (OPSM’s) have been shown useful in capturing concurrent patterns in data when the relative magnitudes of data items are more important than their ab...
Chun Kit Chui, Ben Kao, Kevin Y. Yip, Sau Dan Lee
111
Voted
ICDM
2008
IEEE
127views Data Mining» more  ICDM 2008»
15 years 10 months ago
The Impact of Structural Changes on Predictions of Diffusion in Networks
In a typical realistic scenario, there exist some past data about the structure of the network which are analyzed with respect to some possibly future spreading process, such as b...
Mayank Lahiri, Arun S. Maiya, Rajmonda Sulo, Habib...
133
Voted
INFOCOM
2008
IEEE
15 years 10 months ago
Which Distributed Averaging Algorithm Should I Choose for my Sensor Network?
Average consensus and gossip algorithms have recently received significant attention, mainly because they constitute simple and robust algorithms for distributed information proc...
Patrick Denantes, Florence Bénézit, ...
159
Voted
ISMAR
2008
IEEE
15 years 10 months ago
Pose tracking from natural features on mobile phones
In this paper we present two techniques for natural feature tracking in real-time on mobile phones. We achieve interactive frame rates of up to 20Hz for natural feature tracking f...
Daniel Wagner, Gerhard Reitmayr, Alessandro Mullon...
127
Voted
ISORC
2008
IEEE
15 years 10 months ago
A Flexible Trust Model for Distributed Service Infrastructures
Recent years have witnessed the emergence and rapid growth of distributed service infrastructures such as mobile ad hoc networks, P2P, PlanetLab and Grids. In such distributed inf...
Zhaoyu Liu, Stephen S. Yau, Dichao Peng, Yin Yin
« Prev « First page 1000 / 1190 Last » Next »