Sciweavers

365 search results - page 70 / 73
» Exploiting Model-based Techniques for User Interfaces to Dat...
Sort
View
INFOCOM
2005
IEEE
15 years 5 months ago
Optimal fixed and scalable energy management for wireless networks
— In many devices, wireless network interfaces consume upwards of 30% of scarce portable system energy. Extending the system lifetime by minimizing communication power consumptio...
Rahul Mangharam, Ragunathan Rajkumar, Sofie Pollin...
CIKM
2009
Springer
15 years 6 months ago
Completing wikipedia's hyperlink structure through dimensionality reduction
Wikipedia is the largest monolithic repository of human knowledge. In addition to its sheer size, it represents a new encyclopedic paradigm by interconnecting articles through hyp...
Robert West, Doina Precup, Joelle Pineau
VLDB
2007
ACM
164views Database» more  VLDB 2007»
15 years 12 months ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...
ICDE
2008
IEEE
127views Database» more  ICDE 2008»
16 years 1 months ago
Querying Data under Access Limitations
Data sources on the web are often accessible through web interfaces that present them as relational tables, but require certain attributes to be mandatorily selected, e.g., via a w...
Andrea Calì, Davide Martinenghi
JCDL
2004
ACM
170views Education» more  JCDL 2004»
15 years 5 months ago
Looking for new, not known music only: music retrieval by melody style
With the growth of digital music, content-based music retrieval (CBMR) has attracted increasingly attention. For most CBMR systems, the task is to return music objects similar to ...
Fang-Fei Kuo, Man-Kwan Shan