Sciweavers

10396 search results - page 1790 / 2080
» Deployment Support Network
Sort
View
INFOSCALE
2007
ACM
15 years 6 months ago
A distributed incremental nearest neighbor algorithm
Searching for non-text data (e.g., images) is mostly done by means of metadata annotations or by extracting the text close to the data. However, supporting real content-based audi...
Fabrizio Falchi, Claudio Gennaro, Fausto Rabitti, ...
149
Voted
NSDI
2010
15 years 6 months ago
Prophecy: Using History for High-Throughput Fault Tolerance
Byzantine fault-tolerant (BFT) replication has enjoyed a series of performance improvements, but remains costly due to its replicated work. We eliminate this cost for read-mostly ...
Siddhartha Sen, Wyatt Lloyd, Michael J. Freedman
CSREAPSC
2006
15 years 6 months ago
Ubiquitous Security: Privacy versus Protection
- In the ambient computing future, security promises to be the foundational design feature that allows pervasive systems to protect personal information privacy. As fledgling perva...
Timothy Buennemeyer, Randolph Marchany, Joseph G. ...
150
Voted
DMIN
2006
122views Data Mining» more  DMIN 2006»
15 years 6 months ago
Cost-Sensitive Analysis in Multiple Time Series Prediction
- In this paper we propose a new methodology for Cost-Benefit analysis in a multiple time series prediction problem. The proposed model is evaluated in a real world application bas...
Chamila Walgampaya, Mehmed M. Kantardzic
FOIS
2006
15 years 6 months ago
PR-OWL: A Framework for Probabilistic Ontologies
Abstract. Across a wide range of domains, there is an urgent need for a wellfounded approach to incorporating uncertain and incomplete knowledge into formal domain ontologies. Alth...
Paulo Cesar G. da Costa, Kathryn B. Laskey
« Prev « First page 1790 / 2080 Last » Next »