Sciweavers

1320 search results - page 234 / 264
» Constraint Based Network Adaptation for Ubiquitous Applicati...
Sort
View
SIGMOD
2010
ACM
211views Database» more  SIGMOD 2010»
15 years 5 months ago
ERACER: a database approach for statistical inference and data cleaning
Real-world databases often contain syntactic and semantic errors, in spite of integrity constraints and other safety measures incorporated into modern DBMSs. We present ERACER, an...
Chris Mayfield, Jennifer Neville, Sunil Prabhakar
ADT
2006
15 years 18 days ago
TICP: Transport Information Collection Protocol
We present and validate TICP, a TCP-friendly reliable transport protocol to collect information from a large number of sources spread over the Internet. TICP is a stand-alone proto...
Chadi Barakat, Mohammad Malli, Naomichi Nonaka
AIMSA
2004
Springer
15 years 4 months ago
Identification of Communities of Peers by Trust and Reputation
In: Proceedings of the Eleventh International Conference on Artificial Intelligence: Methodology, Systems, Applications (AIMSA-04), Springer-Verlag LNAI Series. c 2004 We present ...
Alessandro Agostini, Gianluca Moro
MOBISYS
2010
ACM
15 years 2 months ago
Energy-efficient rate-adaptive GPS-based positioning for smartphones
Many emerging smartphone applications require position information to provide location-based or context-aware services. In these applications, GPS is often preferred over its alte...
Jeongyeup Paek, Joongheon Kim, Ramesh Govindan
KDD
2006
ACM
191views Data Mining» more  KDD 2006»
16 years 29 days ago
Beyond classification and ranking: constrained optimization of the ROI
Classification has been commonly used in many data mining projects in the financial service industry. For instance, to predict collectability of accounts receivable, a binary clas...
Lian Yan, Patrick Baldasare