Sciweavers

7751 search results - page 1487 / 1551
» Data streams: algorithms and applications
Sort
View
108
Voted
MOBIHOC
2005
ACM
16 years 3 days ago
Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks
Mobile sinks are needed in many sensor network applications for efficient data collection, data querying, localized sensor reprogramming, identifying and revoking compromised sens...
Wensheng Zhang, Hui Song, Sencun Zhu, Guohong Cao
112
Voted
EUROSYS
2008
ACM
15 years 9 months ago
DepSpace: a byzantine fault-tolerant coordination service
The tuple space coordination model is one of the most interesting coordination models for open distributed systems due to its space and time decoupling and its synchronization pow...
Alysson Neves Bessani, Eduardo Adílio Pelin...
WSDM
2009
ACM
138views Data Mining» more  WSDM 2009»
15 years 7 months ago
Adaptive subjective triggers for opinionated document retrieval
This paper proposes a novel application of a statistical language model to opinionated document retrieval targeting weblogs (blogs). In particular, we explore the use of the trigg...
Kazuhiro Seki, Kuniaki Uehara
ICDM
2009
IEEE
223views Data Mining» more  ICDM 2009»
15 years 7 months ago
Execution Anomaly Detection in Distributed Systems through Unstructured Log Analysis
Abstract -- Detection of execution anomalies is very important for the maintenance, development, and performance refinement of large scale distributed systems. Execution anomalies ...
Qiang Fu, Jian-Guang Lou, Yi Wang, Jiang Li
ICDM
2009
IEEE
149views Data Mining» more  ICDM 2009»
15 years 7 months ago
Accelerated Gradient Method for Multi-task Sparse Learning Problem
—Many real world learning problems can be recast as multi-task learning problems which utilize correlations among different tasks to obtain better generalization performance than...
Xi Chen, Weike Pan, James T. Kwok, Jaime G. Carbon...
« Prev « First page 1487 / 1551 Last » Next »