Sciweavers

1583 search results - page 112 / 317
» The Quorum Deployment Problem
Sort
View
153
Voted
INFOCOM
2012
IEEE
13 years 6 months ago
Memory-assisted universal compression of network flows
—Recently, the existence of considerable amount of redundancy in the Internet traffic has stimulated the deployment of several redundancy elimination techniques within the netwo...
Mohsen Sardari, Ahmad Beirami, Faramarz Fekri
165
Voted
SIGIR
2012
ACM
13 years 6 months ago
Cognos: crowdsourcing search for topic experts in microblogs
Finding topic experts on microblogging sites with millions of users, such as Twitter, is a hard and challenging problem. In this paper, we propose and investigate a new methodolog...
Saptarshi Ghosh, Naveen Kumar Sharma, Fabrí...
SDM
2012
SIAM
234views Data Mining» more  SDM 2012»
13 years 5 months ago
Monitoring and Mining Insect Sounds in Visual Space
Monitoring animals by the sounds they produce is an important and challenging task, whether the application is outdoors in a natural habitat, or in the controlled environment of a...
Yuan Hao, Bilson J. L. Campana, Eamonn J. Keogh
160
Voted
SDM
2012
SIAM
340views Data Mining» more  SDM 2012»
13 years 5 months ago
IntruMine: Mining Intruders in Untrustworthy Data of Cyber-physical Systems
A Cyber-Physical System (CPS) integrates physical (i.e., sensor) devices with cyber (i.e., informational) components to form a situation-aware system that responds intelligently t...
Lu An Tang, Quanquan Gu, Xiao Yu, Jiawei Han, Thom...
181
Voted
AAAI
2012
13 years 5 months ago
Characterizing Multi-Agent Team Behavior from Partial Team Tracings: Evidence from the English Premier League
Real-world AI systems have been recently deployed which can automatically analyze the plan and tactics of tennis players. As the game-state is updated regularly at short intervals...
Patrick Lucey, Alina Bialkowski, Peter Carr, Eric ...