Sciweavers

3791 search results - page 527 / 759
» Packing sets of patterns
Sort
View
TSE
1998
176views more  TSE 1998»
15 years 3 months ago
Constructive Protocol Specification Using Cicero
—New protocols are often useful, but are hard to implement well. Protocol synthesis is a solution, but synthesized protocols can be slow. Implementing protocols will be even more...
Yen-Min Huang, Chinya V. Ravishankar
NAS
2010
IEEE
15 years 2 months ago
CR: Capability Information for Routing of Wireless Ad Hoc Networks in the Real Environment
—In greedy routing, each relay node forwards the message to a neighbor (also called successor) that is closer to the destination. However, the successor candidate set (SCS) is di...
Zhen Jiang, Zhigang Li, Nong Xiao, Jie Wu
151
Voted
SOCIALCOM
2010
15 years 2 months ago
Traffic in Social Media I: Paths Through Information Networks
Wikipedia is used every day by people all around the world, to satisfy a variety of information needs. We crosscorrelate multiple Wikipedia traffic data sets to infer various behav...
Jacob Ratkiewicz, Alessandro Flammini, Filippo Men...
EDM
2009
184views Data Mining» more  EDM 2009»
15 years 2 months ago
Process Mining Online Assessment Data
Traditional data mining techniques have been extensively applied to find interesting patterns, build descriptive and predictive models from large volumes of data accumulated throug...
Mykola Pechenizkiy, Nikola Trcka, Ekaterina Vasily...
ICDM
2009
IEEE
145views Data Mining» more  ICDM 2009»
15 years 2 months ago
Significance of Episodes Based on Minimal Windows
Discovering episodes, frequent sets of events from a sequence has been an active field in pattern mining. Traditionally, a level-wise approach is used to discover all frequent epis...
Nikolaj Tatti