Sciweavers

776 search results - page 80 / 156
» Distributed Information Regularization on Graphs
Sort
View
ISAAC
2005
Springer
153views Algorithms» more  ISAAC 2005»
15 years 8 months ago
Network Game with Attacker and Protector Entities
Consider an information network with harmful procedures called attackers (e.g., viruses); each attacker uses a probability distribution to choose a node of the network to damage. O...
Marios Mavronicolas, Vicky G. Papadopoulou, Anna P...
KDD
2009
ACM
167views Data Mining» more  KDD 2009»
16 years 3 months ago
SNARE: a link analytic system for graph labeling and risk detection
Classifying nodes in networks is a task with a wide range of applications. It can be particularly useful in anomaly and fraud detection. Many resources are invested in the task of...
Mary McGlohon, Stephen Bay, Markus G. Anderle, Dav...
CHI
2008
ACM
16 years 3 months ago
There's always one!: modelling outlying user performance
Informal analysis of many usability tests suggests that there is regularly one participant that is substantially slower than all the others. Moreover, such outliers are more extre...
Julie Schiller, Paul A. Cairns
ISPDC
2006
IEEE
15 years 8 months ago
Video Stream Annotations for Energy Trade-offs in Multimedia Applications
Recent applications for distributed mobile devices, including multimedia video/audio streaming, typically process streams of incoming data in a regular, predictable way. The behav...
Radu Cornea, Alex Nicolau, Nikil Dutt
SIGSOFT
1994
ACM
15 years 7 months ago
Speeding up Slicing
Program slicing is a fundamental operation for many software engineering tools. Currently, the most efficient algorithm for interprocedural slicing is one that uses a program repr...
Thomas W. Reps, Susan Horwitz, Shmuel Sagiv, Genev...