Sciweavers

3806 search results - page 664 / 762
» The Power of Process
Sort
View
MOBISYS
2008
ACM
16 years 4 months ago
SeeMon: scalable and energy-efficient context monitoring framework for sensor-rich mobile environments
Proactively providing services to mobile individuals is essential for emerging ubiquitous applications. The major challenge in providing users with proactive services lies in cont...
Seungwoo Kang, Jinwon Lee, Hyukjae Jang, Hyonik Le...
WSDM
2010
ACM
322views Data Mining» more  WSDM 2010»
16 years 2 months ago
Inferring Search Behaviors Using Partially Observable Markov (POM) Model
This article describes an application of the partially observable Markov (POM) model to the analysis of a large scale commercial web search log. Mathematically, POM is a variant o...
Kuansan Wang, Nikolas Gloy, Xiaolong Li
144
Voted
ALT
2004
Springer
16 years 1 months ago
Comparison of Query Learning and Gold-Style Learning in Dependence of the Hypothesis Space
Different formal learning models address different aspects of learning. Below we compare learning via queries—interpreting learning as a one-shot process in which the learner i...
Steffen Lange, Sandra Zilles
WWW
2010
ACM
15 years 12 months ago
Not so creepy crawler: easy crawler generation with standard xml queries
Web crawlers are increasingly used for focused tasks such as the extraction of data from Wikipedia or the analysis of social networks like last.fm. In these cases, pages are far m...
Franziska von dem Bussche, Klara A. Weiand, Benedi...
CCS
2010
ACM
15 years 11 months ago
Practical ID-based encryption for wireless sensor network
In this paper, we propose a new practical identity-based encryption scheme which is suitable for wireless sensor network (WSN). We call it Receiver-Bounded Online/Offline Identity...
Cheng-Kang Chu, Joseph K. Liu, Jianying Zhou, Feng...