Sciweavers

2995 search results - page 414 / 599
» On multi-avoidance of generalized patterns
Sort
View
136
Voted
SIGCOMM
2003
ACM
15 years 8 months ago
A high-level programming environment for packet trace anonymization and transformation
Packet traces of operational Internet traffic are invaluable to network research, but public sharing of such traces is severely limited by the need to first remove all sensitive...
Ruoming Pang, Vern Paxson
123
Voted
WIDM
2003
ACM
15 years 8 months ago
Schema-guided wrapper maintenance for web-data extraction
Extracting data from Web pages using wrappers is a fundamental problem arising in a large variety of applications of vast practical interests. There are two main issues relevant t...
Xiaofeng Meng, Dongdong Hu, Chen Li
135
Voted
WSNA
2003
ACM
15 years 8 months ago
Information-directed routing in ad hoc sensor networks
—In a sensor network, data routing is tightly coupled to the needs of a sensing task, and hence the application semantics. This paper introduces the novel idea of information-dir...
Juan Liu, Feng Zhao, Dragan Petrovic
160
Voted
ATAL
2003
Springer
15 years 8 months ago
Modifying agent systems for an open, dynamic agent environment
Most agent systems today are closed and static. That is, one uses Agent-Oriented Software Engineering techniques to build agent systems in which the set of agents is specified ahe...
Adam L. Berger, Robert R. Kessler
124
Voted
AUSAI
2003
Springer
15 years 8 months ago
Association Rule Discovery with Unbalanced Class Distributions
There are many methods for finding association rules in very large data. However it is well known that most general association rule discovery methods find too many rules, which...
Lifang Gu, Jiuyong Li, Hongxing He, Graham J. Will...