Sciweavers

909 search results - page 155 / 182
» Relational bytecode correlations
Sort
View
VLDB
2007
ACM
93views Database» more  VLDB 2007»
15 years 3 months ago
Seeking Stable Clusters in the Blogosphere
The popularity of blogs has been increasing dramatically over the last couple of years. As topics evolve in the blogosphere, keywords align together and form the heart of various ...
Nilesh Bansal, Fei Chiang, Nick Koudas, Frank Wm. ...
CSB
2005
IEEE
126views Bioinformatics» more  CSB 2005»
15 years 3 months ago
Identifying Simple Discriminatory Gene Vectors with an Information Theory Approach
In the feature selection of cancer classification problems, many existing methods consider genes individually by choosing the top genes which have the most significant signal-to...
Zheng Yun, Kwoh Chee Keong
MM
2005
ACM
141views Multimedia» more  MM 2005»
15 years 3 months ago
SEVA: sensor-enhanced video annotation
In this paper, we study how a sensor-rich world can be exploited by digital recording devices such as cameras and camcorders to improve a user’s ability to search through a larg...
Xiaotao Liu, Mark D. Corner, Prashant J. Shenoy
WOWMOM
2005
ACM
109views Multimedia» more  WOWMOM 2005»
15 years 3 months ago
On Maximizing Lifetime of a Sensor Cluster
We consider the energy consumed in radio transmission of a set of sensors forming a data gathering wireless network. Our objective is to enhance the lifetime of such networks by e...
Samar Agnihotri, Pavan Nuggehalli, H. S. Jamadagni
CASSIS
2005
Springer
15 years 3 months ago
The Architecture of a Privacy-Aware Access Control Decision Component
Today many interactions are carried out online through Web sites and e-services and often private and/or sensitive information is required by service providers. A growing concern r...
Claudio Agostino Ardagna, Marco Cremonini, Ernesto...