Sciweavers

1813 search results - page 336 / 363
» Instance Pruning Techniques
Sort
View
89
Voted
WEBDB
2009
Springer
131views Database» more  WEBDB 2009»
15 years 4 months ago
Functional Dependency Generation and Applications in Pay-As-You-Go Data Integration Systems
Recently, the opportunity of extracting structured data from the Web has been identified by a number of research projects. One such example is that millions of relational-style H...
Daisy Zhe Wang, Xin Luna Dong, Anish Das Sarma, Mi...
83
Voted
DCOSS
2009
Springer
15 years 4 months ago
Finding Symbolic Bug Patterns in Sensor Networks
Abstract. This paper presents a failure diagnosis algorithm for summarizing and generalizing patterns that lead to instances of anomalous behavior in sensor networks. Often multipl...
Mohammad Maifi Hasan Khan, Tarek F. Abdelzaher, Ji...
ICB
2009
Springer
144views Biometrics» more  ICB 2009»
15 years 4 months ago
Parts-Based Face Verification Using Local Frequency Bands
ic Presentations - Abstracts list Monday, August 31st Session 1 – Chairman: Jean-Marc Odobez Title Quality Measures and Stacking Classifiers in Multimodal Biometric Recognition S...
Chris McCool, Sébastien Marcel
81
Voted
SSS
2009
Springer
195views Control Systems» more  SSS 2009»
15 years 4 months ago
Anonymous Transactions in Computer Networks
Abstract. We present schemes for providing anonymous transactions while privacy and anonymity are preserved, providing user anonymous authentication in distributed networks such as...
Shlomi Dolev, Marina Kopeetsky
SYSTOR
2009
ACM
15 years 4 months ago
The effectiveness of deduplication on virtual machine disk images
Virtualization is becoming widely deployed in servers to efficiently provide many logically separate execution environments while reducing the need for physical servers. While th...
Keren Jin, Ethan L. Miller