Sciweavers

5550 search results - page 1078 / 1110
» Different Approaches to Proof Systems
Sort
View
WWW
2008
ACM
15 years 10 months ago
Utility-driven load shedding for xml stream processing
Because of the high volume and unpredictable arrival rate, stream processing systems may not always be able to keep up with the input data streams-- resulting in buffer overflow a...
Mingzhu Wei, Elke A. Rundensteiner, Murali Mani
WWW
2007
ACM
15 years 10 months ago
Measuring semantic similarity between words using web search engines
Semantic similarity measures play important roles in information retrieval and Natural Language Processing. Previous work in semantic web-related applications such as community mi...
Danushka Bollegala, Yutaka Matsuo, Mitsuru Ishizuk...
WWW
2006
ACM
15 years 10 months ago
A comparison of implicit and explicit links for web page classification
It is well known that Web-page classification can be enhanced by using hyperlinks that provide linkages between Web pages. However, in the Web space, hyperlinks are usually sparse...
Dou Shen, Jian-Tao Sun, Qiang Yang, Zheng Chen
KDD
2009
ACM
188views Data Mining» more  KDD 2009»
15 years 10 months ago
Characteristic relational patterns
Research in relational data mining has two major directions: finding global models of a relational database and the discovery of local relational patterns within a database. While...
Arne Koopman, Arno Siebes
PERCOM
2009
ACM
15 years 10 months ago
Mobile Ad Hoc Networks: the DHT paradigm
In this paper, a DHT-based routing protocol which integrates at the network layer both traditional direct routing, i.e. MANET routing, and indirect key-based routing, i.e. P2P rout...
Marcello Caleffi
« Prev « First page 1078 / 1110 Last » Next »