Sciweavers

415 search results - page 51 / 83
» Intruders pattern identification
Sort
View
IEEECIT
2010
IEEE
14 years 7 months ago
Adaptive Algorithms for Efficient Content Management in Social Network Services
Identifying the set of resources that are expected to receive the majority of requests in the near future, namely hot set, is at the basis of most content management strategies of...
Claudia Canali, Michele Colajanni, Riccardo Lancel...
LREC
2010
309views Education» more  LREC 2010»
14 years 11 months ago
Comment Extraction from Blog Posts and Its Applications to Opinion Mining
Blog posts containing many personal experiences or perspectives toward specific subjects are useful. Blogs allow readers to interact with bloggers by placing comments on specific ...
Huan-An Kao, Hsin-Hsi Chen
CORR
2010
Springer
207views Education» more  CORR 2010»
14 years 10 months ago
Collaborative Hierarchical Sparse Modeling
Sparse modeling is a powerful framework for data analysis and processing. Traditionally, encoding in this framework is performed by solving an 1-regularized linear regression prob...
Pablo Sprechmann, Ignacio Ramírez, Guillerm...
CORR
2010
Springer
85views Education» more  CORR 2010»
14 years 10 months ago
The Motif Tracking Algorithm
: The search for patterns or motifs in data represents a problem area of key interest to finance and economic researchers. In this paper we introduce the Motif Tracking Algorithm, ...
William O. Wilson, Phil Birkin, Uwe Aickelin
OOPSLA
2010
Springer
14 years 7 months ago
A recommender for conflict resolution support in optimistic model versioning
The usage of optimistic version control systems comes along with cumbersome and time-consuming conflict resolution in the case that the modifications of two developers are contrad...
Petra Brosch, Martina Seidl, Gerti Kappel