Sciweavers

5348 search results - page 901 / 1070
» Time-critical information services
Sort
View
98
Voted
P2P
2009
IEEE
114views Communications» more  P2P 2009»
15 years 8 months ago
Why Kad Lookup Fails
A Distributed Hash Table (DHT) is a structured overlay network service that provides a decentralized lookup for mapping objects to locations. In this paper, we study the lookup pe...
Hun Jeong Kang, Eric Chan-Tin, Nicholas Hopper, Yo...
ICDCSW
2009
IEEE
15 years 8 months ago
A Straightforward Path Routing in Wireless Ad Hoc Sensor Networks
Building a “Straightforward” path in wireless ad hoc sensor networks (WASNs) not only avoids wasting energy in detours, but also incurs less interference in other transmission...
Zhen Jiang, Junchao Ma, Wei Lou, Jie Wu
ICDM
2009
IEEE
124views Data Mining» more  ICDM 2009»
15 years 8 months ago
On the (In)Security and (Im)Practicality of Outsourcing Precise Association Rule Mining
—The recent interest in outsourcing IT services onto the cloud raises two main concerns: security and cost. One task that could be outsourced is data mining. In VLDB 2007, Wong e...
Ian Molloy, Ninghui Li, Tiancheng Li
ICDM
2009
IEEE
97views Data Mining» more  ICDM 2009»
15 years 8 months ago
Hierarchical Probabilistic Segmentation of Discrete Events
—Segmentation, the task of splitting a long sequence of discrete symbols into chunks, can provide important information about the nature of the sequence that is understandable to...
Guy Shani, Christopher Meek, Asela Gunawardana
93
Voted
ICDM
2009
IEEE
113views Data Mining» more  ICDM 2009»
15 years 8 months ago
Connecting Sparsely Distributed Similar Bloggers
—The nature of the Blogosphere determines that the majority of bloggers are only connected with a small number of fellow bloggers, and similar bloggers can be largely disconnecte...
Nitin Agarwal, Huan Liu, Shankara B. Subramanya, J...