Sciweavers

20175 search results - page 3862 / 4035
» Is abstraction the key to computing
Sort
View
ICDM
2009
IEEE
126views Data Mining» more  ICDM 2009»
15 years 7 months ago
Convex Non-negative Matrix Factorization in the Wild
Abstract—Non-negative matrix factorization (NMF) has recently received a lot of attention in data mining, information retrieval, and computer vision. It factorizes a non-negative...
Christian Thurau, Kristian Kersting, Christian Bau...
ICPP
2009
IEEE
15 years 7 months ago
On Maximum Stability with Enhanced Scalability in High-Churn DHT Deployment
Abstract—When applied in a commercial deployment, DHTbased P2P protocols face a dilemma: although most real-world participants are so unstable that the maintenance overhead is pr...
Junfeng Xie, Zhenhua Li, Guihai Chen, Jie Wu
119
Voted
IPPS
2009
IEEE
15 years 7 months ago
Network awareness of P2P live streaming applications
Abstract—Early P2P-TV systems have already attracted millions of users, and many new commercial solutions are entering this market. Little information is however available about ...
Delia Ciullo, M.-A. Garcia da Rocha Neta, Á...
114
Voted
BICOB
2009
Springer
15 years 7 months ago
A Bayesian Approach to High-Throughput Biological Model Generation
Abstract. With the availability of hundreds and soon-to-be thousands of complete genomes, the construction of genome-scale metabolic models for these organisms has attracted much a...
Xinghua Shi, Rick L. Stevens
101
Voted
DCOSS
2009
Springer
15 years 7 months ago
Finding Symbolic Bug Patterns in Sensor Networks
Abstract. This paper presents a failure diagnosis algorithm for summarizing and generalizing patterns that lead to instances of anomalous behavior in sensor networks. Often multipl...
Mohammad Maifi Hasan Khan, Tarek F. Abdelzaher, Ji...
« Prev « First page 3862 / 4035 Last » Next »