Sciweavers

490 search results - page 77 / 98
» Enabling User Control with Personal Identity Management
Sort
View
CIKM
2010
Springer
14 years 11 months ago
FacetCube: a framework of incorporating prior knowledge into non-negative tensor factorization
Non-negative tensor factorization (NTF) is a relatively new technique that has been successfully used to extract significant characteristics from polyadic data, such as data in s...
Yun Chi, Shenghuo Zhu
128
Voted
CIKM
2006
Springer
15 years 2 months ago
Efficient range-constrained similarity search on wavelet synopses over multiple streams
Due to the resource limitation in the data stream environment, it has been reported that answering user queries according to the wavelet synopsis of a stream is an essential abili...
Hao-Ping Hung, Ming-Syan Chen
101
Voted
CORR
2010
Springer
168views Education» more  CORR 2010»
14 years 7 months ago
In Cloud, Can Scientific Communities Benefit from the Economies of Scale?
The basic idea behind cloud computing is that resource providers offer elastic resources to end users. In this paper, we intend to answer one key question to the success of cloud c...
Lei Wang, Jianfeng Zhan, Weisong Shi, Yi Liang
80
Voted
KES
2004
Springer
15 years 5 months ago
comDesk: A Cooperative Assistance Tool Based on P2P Techniques
We have designed and implemented a desktop sharing system based on P2P (peer-to-peer) techniques, named “comDesk,” which enables users to exchange the desktop images as well as...
Motoki Miura, Buntarou Shizuki, Jiro Tanaka
COMPLEX
2009
Springer
15 years 4 months ago
Using the Weighted Rich-Club Coefficient to Explore Traffic Organization in Mobility Networks
Abstract. The aim of a transportation system is to enable the movement of goods or persons between any two locations with the highest possible efficiency. This simple principle ins...
Jose J. Ramasco, Vittoria Colizza, Pietro Panzaras...