Sciweavers

2131 search results - page 313 / 427
» Immunity for Closed Sets
Sort
View
MODELS
2010
Springer
14 years 10 months ago
Inferring Meta-models for Runtime System Data from the Clients of Management APIs
Abstract. A new trend in runtime system monitoring is to utilize MOFbased techniques in analyzing the runtime system data. Approaches and tools have been proposed to automatically ...
Hui Song, Gang Huang, Yingfei Xiong, Franck Chauve...
PAMI
2010
164views more  PAMI 2010»
14 years 10 months ago
Large-Scale Discovery of Spatially Related Images
— We propose a randomized data mining method that finds clusters of spatially overlapping images. The core of the method relies on the min-Hash algorithm for fast detection of p...
Ondrej Chum, Jiri Matas
PKDD
2010
Springer
128views Data Mining» more  PKDD 2010»
14 years 10 months ago
Learning to Tag from Open Vocabulary Labels
Most approaches to classifying media content assume a fixed, closed vocabulary of labels. In contrast, we advocate machine learning approaches which take advantage of the millions...
Edith Law, Burr Settles, Tom M. Mitchell
PODC
2010
ACM
14 years 10 months ago
Meeting the deadline: on the complexity of fault-tolerant continuous gossip
In this paper, we introduce the problem of Continuous Gossip in which rumors are continually and dynamically injected throughout the network. Each rumor has a deadline, and the go...
Chryssis Georgiou, Seth Gilbert, Dariusz R. Kowals...
PUC
2010
128views more  PUC 2010»
14 years 10 months ago
Interaction with large ubiquitous displays using camera-equipped mobile phones
Abstract In the ubiquitous computing environment, people will interact with everyday objects (or computers embedded in them) in ways different from the usual and familiar desktop u...
Seokhee Jeon, Jane Hwang, Gerard Jounghyun Kim, Ma...