Sciweavers

5962 search results - page 1132 / 1193
» Efficient Clustering for Orders
Sort
View
139
Voted
MOBISYS
2008
ACM
16 years 11 days ago
Behavioral detection of malware on mobile handsets
A novel behavioral detection framework is proposed to detect mobile worms, viruses and Trojans, instead of the signature-based solutions currently available for use in mobile devi...
Abhijit Bose, Xin Hu, Kang G. Shin, Taejoon Park
114
Voted
WSDM
2010
ACM
172views Data Mining» more  WSDM 2010»
15 years 10 months ago
Early Online Identification of Attention Gathering Items In Social Media
Activity in social media such as blogs, micro-blogs, social networks, etc is manifested via interaction that involves text, images, links and other information items. Naturally, s...
Michael Mathioudakis, Nick Koudas, Peter Marbach
SODA
2010
ACM
235views Algorithms» more  SODA 2010»
15 years 10 months ago
Algorithmic Lower Bounds for Problems Parameterized by Clique-width
Many NP-hard problems can be solved efficiently when the input is restricted to graphs of bounded tree-width or clique-width. In particular, by the celebrated result of Courcelle,...
Fedor V. Fomin, Petr A. Golovach, Daniel Lokshtano...
96
Voted
IUI
2010
ACM
15 years 9 months ago
Agent-assisted task management that reduces email overload
RADAR is a multiagent system with a mixed-initiative user interface designed to help office workers cope with email overload. RADAR agents observe experts to learn models of their...
Aaron Steinfeld, Andrew Faulring, Asim Smailagic, ...
231
Voted
AICT
2009
IEEE
226views Communications» more  AICT 2009»
15 years 7 months ago
Optimizing MBMS Power Allocation through HSDPA Transmissions
— Multimedia Broadcast Multicast Service (MBMS) epitomizes the increasing popularity of enhanced end-user experience in Universal Mobile Telecommunications System (UMTS), since i...
Antonios G. Alexiou, Christos Bouras, Evangelos Re...
« Prev « First page 1132 / 1193 Last » Next »