Sciweavers

704 search results - page 130 / 141
» Exploiting Data Missingness in Bayesian Network Modeling
Sort
View
WSDM
2010
ACM
172views Data Mining» more  WSDM 2010»
15 years 8 months ago
Early Online Identification of Attention Gathering Items In Social Media
Activity in social media such as blogs, micro-blogs, social networks, etc is manifested via interaction that involves text, images, links and other information items. Naturally, s...
Michael Mathioudakis, Nick Koudas, Peter Marbach
USS
2008
15 years 1 months ago
CloudAV: N-Version Antivirus in the Network Cloud
Antivirus software is one of the most widely used tools for detecting and stopping malicious and unwanted files. However, the long term effectiveness of traditional hostbased anti...
Jon Oberheide, Evan Cooke, Farnam Jahanian
EDBT
2008
ACM
194views Database» more  EDBT 2008»
15 years 11 months ago
XCraft: boosting the performance of active XML materialization
An active XML (AXML) document contains tags representing calls to Web services. Therefore, retrieving its contents consists in materializing its data elements by invoking the embe...
Gabriela Ruberg, Marta Mattoso
74
Voted
FPL
2004
Springer
125views Hardware» more  FPL 2004»
15 years 4 months ago
SoftSONIC: A Customisable Modular Platform for Video Applications
This paper presents the Customisable Modular Platform (CMP) approach. The aim is to accelerate FPGA application developraising the level of abstraction and facilitating design reus...
Tero Rissa, Peter Y. K. Cheung, Wayne Luk
WAIM
2001
Springer
15 years 3 months ago
Three-Tier Clustering: An Online Citation Clustering System
In this paper, we present an online citation entry clustering system based on three-tier clustering. The objective is to further process search results returned by bibliography dat...
Haifeng Jiang, Wenwu Lou, Wei Wang 0011