Sciweavers

46931 search results - page 9321 / 9387
» Networking the networks
Sort
View
IS
2010
14 years 8 months ago
Tree pattern mining with tree automata constraints
Most work on pattern mining focuses on simple data structures such as itemsets and sequences of itemsets. However, a lot of recent applications dealing with complex data like chem...
Sandra de Amo, Nyara A. Silva, Ronaldo P. Silva, F...
ISCA
2010
IEEE
216views Hardware» more  ISCA 2010»
14 years 8 months ago
The impact of management operations on the virtualized datacenter
Virtualization has the potential to dramatically reduce the total cost of ownership of datacenters and increase the flexibility of deployments for general-purpose workloads. If pr...
Vijayaraghavan Soundararajan, Jennifer M. Anderson
TMC
2008
159views more  TMC 2008»
14 years 8 months ago
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency resp...
Bugra Gedik, Ling Liu
TSMC
2008
117views more  TSMC 2008»
14 years 8 months ago
Discovery of High-Level Behavior From Observation of Human Performance in a Strategic Game
This paper explores the issues faced in creating a sys-4 tem that can learn tactical human behavior merely by observing5 a human perform the behavior in a simulation. More specific...
Brian S. Stensrud, Avelino J. Gonzalez
JOCN
2010
129views more  JOCN 2010»
14 years 8 months ago
Arabic Morphology in the Neural Language System
■ There are two views about morphology, the aspect of language concerned with the internal structure of words. One view holds that morphology is a domain of knowledge with a spe...
Sami Boudelaa, Friedemann Pulvermüller, Olaf ...
« Prev « First page 9321 / 9387 Last » Next »