Sciweavers

606 search results - page 105 / 122
» Memory-constrained aggregate computation over data streams
Sort
View
110
Voted
IMC
2009
ACM
15 years 4 months ago
Characterizing user behavior in online social networks
Understanding how users behave when they connect to social networking sites creates opportunities for better interface design, richer studies of social interactions, and improved ...
Fabrício Benevenuto, Tiago Rodrigues, Meeyo...
KDD
2010
ACM
304views Data Mining» more  KDD 2010»
14 years 8 months ago
Automatic malware categorization using cluster ensemble
Malware categorization is an important problem in malware analysis and has attracted a lot of attention of computer security researchers and anti-malware industry recently. Today...
Yanfang Ye, Tao Li, Yong Chen, Qingshan Jiang
91
Voted
BIOINFORMATICS
2011
14 years 1 months ago
A method for probing the mutational landscape of amyloid structure
Motivation: Proteins of all kinds can self-assemble into highly ordered β-sheet aggregates known as amyloid fibrils, important both biologically and clinically. However, the spe...
Charles W. O'Donnell, Jérôme Waldisp&...
SIGMOD
2011
ACM
202views Database» more  SIGMOD 2011»
14 years 8 days ago
Sensitivity analysis and explanations for robust query evaluation in probabilistic databases
Probabilistic database systems have successfully established themselves as a tool for managing uncertain data. However, much of the research in this area has focused on efficient...
Bhargav Kanagal, Jian Li, Amol Deshpande
LREC
2010
180views Education» more  LREC 2010»
14 years 11 months ago
Collecting Voices from the Cloud
The collection and transcription of speech data is typically an expensive and time-consuming task. Voice over IP and cloud computing are poised to greatly reduce this impediment t...
Ian McGraw, Chia-ying Lee, I. Lee Hetherington, St...